Cargando…

Advanced malware analysis /

A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Elisan, Christopher C. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, [2015]
Edición:Version 1.0.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • Contents at a Glance
  • Contents
  • Foreword
  • Acknowledgments
  • Introduction
  • Part I Malware Blueprint
  • Chapter 1 Malware Analysis 101
  • Malware Analysis
  • Malware Analysis and Reverse Engineering
  • Types of Malware Analysis
  • Purpose of Malware Analysis
  • Limitations of Malware Analysis
  • The Malware Analysis Process
  • The Effective Malware Analyst
  • Familiarization with Malware
  • Familiarization with Analysis Tools
  • Patience
  • Recap
  • Chapter 2 Malware Taxonomy
  • Malware Classes
  • Infectors
  • Network Worms
  • Trojan Horse
  • Backdoors
  • Remote-Access Trojan
  • Information Stealers
  • Ransomware
  • Scareware
  • Fakeware
  • Greyware
  • Recap
  • Chapter 3 Malware Deployment
  • Malware Infection Vectors
  • Speed
  • Stealth
  • Coverage
  • Shelf Life
  • Types of Malware Infection Vectors
  • Physical Media
  • E-mails
  • Instant Messaging and Chat
  • Social Networking
  • URL Links
  • File Shares
  • Software Vulnerabilities
  • Potential Infection Vectors
  • Recap
  • Chapter 4 Protective Mechanisms
  • The Two States of Malware
  • Static Malware
  • Dynamic Malware
  • Protective Mechanisms
  • Static Malware Protective Mechanisms
  • Dynamic Malware Protective Mechanisms
  • Recap
  • Chapter 5 Malware Dependencies
  • Dependency Types
  • Environment Dependencies
  • Program Dependencies
  • Timing Dependencies
  • Event Dependencies
  • User Dependencies
  • File Dependencies
  • Recap
  • Part II Malware Research Lab
  • Chapter 6 Malware Collection
  • Your Own Backyard
  • Scan for Malicious Files
  • Look for Active Rootkits
  • Inspect Startup Programs
  • Inspect Running Processes
  • Extract Suspicious Files
  • Free Sources
  • Contagio
  • KernelMode.info
  • MalShare.com
  • Malware.lu
  • Malware Blacklist
  • Malwarebytes Forum
  • Malekal's Forum
  • Open Malware
  • Tuts4You
  • VirusShare.com
  • VX Heaven
  • Malware Trackers
  • Research Mailing Lists
  • Sample Exchange
  • Commercial Sources
  • Honeypots
  • Dionaea
  • Recap
  • Tools
  • Chapter 7 Static Analysis Lab
  • The Static Analysis Lab
  • Host File Inspection Tools
  • Mitigate Possible Infection
  • Mitigate Becoming a Malware Staging Point
  • Anonymous Communication
  • Setting Up the Lab
  • Choose the Hardware
  • Install the Operating System
  • Harden the Lab
  • Anonymize the Lab
  • Isolate the Lab
  • The Virtualized Static Analysis Lab
  • Backing Up and Restoring
  • Recap
  • Tools
  • Chapter 8 Dynamic Analysis Lab
  • Setting Up the Lab
  • Choose the Hardware
  • Install the Operating System
  • Make the Lab Malware Friendly
  • Anonymize the Lab
  • Isolate the Lab
  • Restoring to a Clean State
  • Virtualized Environment Clean State Restoration
  • Bare-Metal Environment Clean State Restoration
  • Backing Up and Restoring
  • The Golden Image
  • Host OS
  • Other Systems Supporting the Lab
  • Recap
  • Tools
  • Part III Malware Inspection
  • Chapter 9 The Portable Executable File