Cargando…

Practical Malware Analysis : a Hands-On Guide to Dissecting Malicious Software.

There are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid intro...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sikorski, Michael
Otros Autores: Honig, Andrew
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco : No Starch Press, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn830164262
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 130316s2012 cau o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDXCP  |d MEAUC  |d DEBSZ  |d OCLCQ  |d XFH  |d OCLCF  |d IDEBK  |d RECBK  |d ZCU  |d MERUC  |d OCLCQ  |d OCLCO  |d U3W  |d OCLCA  |d CNNOR  |d ICG  |d INT  |d AU@  |d OCLCQ  |d DKC  |d OCLCQ  |d SGP  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 994353322  |a 1156147137 
020 |a 9781593274306 
020 |a 1593274300 
020 |a 1593272901 
020 |a 9781593272906 
029 1 |a DEBBG  |b BV044173859 
029 1 |a DEBSZ  |b 397494270 
035 |a (OCoLC)830164262  |z (OCoLC)994353322  |z (OCoLC)1156147137 
050 4 |a QA76.76.C68 S534 2012 
080 |a 004.491.22 
082 0 4 |a 005.84 
049 |a UAMI 
100 1 |a Sikorski, Michael. 
245 1 0 |a Practical Malware Analysis :  |b a Hands-On Guide to Dissecting Malicious Software. 
260 |a San Francisco :  |b No Starch Press,  |c 2012. 
300 |a 1 online resource (802 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Warning; About the Authors; About the Technical Reviewer; About the Contributing Authors; Foreword; Acknowledgments; Individual Thanks; Introduction; What Is Malware Analysis?; Prerequisites; Practical, Hands-On Learning; What's in the Book?; 0: Malware Analysis Primer; The Goals of Malware Analysis; Malware Analysis Techniques; Basic Static Analysis; Basic Dynamic Analysis; Advanced Static Analysis; Advanced Dynamic Analysis; Types of Malware; General Rules for Malware Analysis; Part 1: Basic Analysis; 1: Basic Static Techniques; Antivirus Scanning: A Useful First Step. 
505 8 |a Hashing: A Fingerprint for MalwareFinding Strings; Packed and Obfuscated Malware; Packing Files; Detecting Packers with PEiD; Portable Executable File Format; Linked Libraries and Functions; Static, Runtime, and Dynamic Linking; Exploring Dynamically Linked Functions with Dependency Walker; Imported Functions; Exported Functions; Static Analysis in Practice; PotentialKeylogger.exe: An Unpacked Executable; PackedProgram.exe: A Dead End; The PE File Headers and Sections; Examining PE Files with PEview; Viewing the Resource Section with Resource Hacker; Using Other PE File Tools. 
505 8 |a PE Header SummaryConclusion; Lab 1-1; Questions; Lab 1-2; Questions; Lab 1-3; Questions; Lab 1-4; Questions; 2: Malware Analysis in Virtual Machines; The Structure of a Virtual Machine; Creating Your Malware Analysis Machine; Configuring VMware; Using Your Malware Analysis Machine; Connecting Malware to the Internet; Connecting and Disconnecting Peripheral Devices; Taking Snapshots; Transferring Files from a Virtual Machine; The Risks of Using VMware for Malware Analysis; Record/Replay: Running Your Computer in Reverse; Conclusion; 3: Basic Dynamic Analysis. 
505 8 |a Sandboxes: The Quick-and-Dirty ApproachUsing a Malware Sandbox; Sandbox Drawbacks; Running Malware; Monitoring with Process Monitor; The Procmon Display; Filtering in Procmon; Viewing Processes with Process Explorer; The Process Explorer Display; Using the Verify Option; Comparing Strings; Using Dependency Walker; Analyzing Malicious Documents; Comparing Registry Snapshots with Regshot; Faking a Network; Using ApateDNS; Monitoring with Netcat; Packet Sniffing with Wireshark; Using INetSim; Basic Dynamic Tools in Practice; Conclusion; Lab 3-1; Questions; Lab 3-2; Questions; Lab 3-3; Questions. 
505 8 |a Lab 3-4Questions; Part 2: Advanced Static Analysis; 4: A Crash Course in x86 Disassembly; Levels of Abstraction; Reverse-Engineering; The x86 Architecture; Main Memory; Instructions; Opcodes and Endianness; Operands; Registers; Simple Instructions; The Stack; Conditionals; Branching; Rep Instructions; C Main Method and Offsets; More Information: Intel x86 Architecture Manuals; Conclusion; 5: IDA Pro; Loading an Executable; The IDA Pro Interface; Disassembly Window Modes; Useful Windows for Analysis; Returning to the Default View; Navigating IDA Pro; Searching; Using Cross-References. 
500 |a Code Cross-References. 
520 |a There are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid introduction to the tools and methods used to dissect malicious software (malware), showing readers how to discover, debug, and disassemble these threats. The book goes on to examine how to overcome the evasive techniques?stealth, code obfuscation, encryption, file packing, and others?that malware author. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Malware (Computer software) 
650 0 |a Computer viruses. 
650 0 |a Debugging in computer science. 
650 0 |a Computer security. 
650 6 |a Logiciels malveillants. 
650 6 |a Virus informatiques. 
650 6 |a Débogage. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Security  |x Viruses & Malware.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Computer viruses  |2 fast 
650 7 |a Debugging in computer science  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
700 1 |a Honig, Andrew. 
758 |i has work:  |a Practical malware analysis (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGfFqxBVbRTkRX7hHgM8fq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Sikorski, Michael.  |t Practical Malware Analysis : A Hands-On Guide to Dissecting Malicious Software.  |d San Francisco : No Starch Press, ©2012  |z 9781593272906 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1137570  |z Texto completo 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis23519482 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00709953 
938 |a YBP Library Services  |b YANK  |n 10349927 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6095762 
994 |a 92  |b IZTAP