Advanced malware analysis /
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York :
McGraw-Hill Education,
[2015]
|
Edición: | Version 1.0. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents at a Glance
- Contents
- Foreword
- Acknowledgments
- Introduction
- Part I Malware Blueprint
- Chapter 1 Malware Analysis 101
- Malware Analysis
- Malware Analysis and Reverse Engineering
- Types of Malware Analysis
- Purpose of Malware Analysis
- Limitations of Malware Analysis
- The Malware Analysis Process
- The Effective Malware Analyst
- Familiarization with Malware
- Familiarization with Analysis Tools
- Patience
- Recap
- Chapter 2 Malware Taxonomy
- Malware Classes
- Infectors
- Network Worms
- Trojan Horse
- Backdoors
- Remote-Access Trojan
- Information Stealers
- Ransomware
- Scareware
- Fakeware
- Greyware
- Recap
- Chapter 3 Malware Deployment
- Malware Infection Vectors
- Speed
- Stealth
- Coverage
- Shelf Life
- Types of Malware Infection Vectors
- Physical Media
- E-mails
- Instant Messaging and Chat
- Social Networking
- URL Links
- File Shares
- Software Vulnerabilities
- Potential Infection Vectors
- Recap
- Chapter 4 Protective Mechanisms
- The Two States of Malware
- Static Malware
- Dynamic Malware
- Protective Mechanisms
- Static Malware Protective Mechanisms
- Dynamic Malware Protective Mechanisms
- Recap
- Chapter 5 Malware Dependencies
- Dependency Types
- Environment Dependencies
- Program Dependencies
- Timing Dependencies
- Event Dependencies
- User Dependencies
- File Dependencies
- Recap
- Part II Malware Research Lab
- Chapter 6 Malware Collection
- Your Own Backyard
- Scan for Malicious Files
- Look for Active Rootkits
- Inspect Startup Programs
- Inspect Running Processes
- Extract Suspicious Files
- Free Sources
- Contagio
- KernelMode.info
- MalShare.com
- Malware.lu
- Malware Blacklist
- Malwarebytes Forum
- Malekal's Forum
- Open Malware
- Tuts4You
- VirusShare.com
- VX Heaven
- Malware Trackers
- Research Mailing Lists
- Sample Exchange
- Commercial Sources
- Honeypots
- Dionaea
- Recap
- Tools
- Chapter 7 Static Analysis Lab
- The Static Analysis Lab
- Host File Inspection Tools
- Mitigate Possible Infection
- Mitigate Becoming a Malware Staging Point
- Anonymous Communication
- Setting Up the Lab
- Choose the Hardware
- Install the Operating System
- Harden the Lab
- Anonymize the Lab
- Isolate the Lab
- The Virtualized Static Analysis Lab
- Backing Up and Restoring
- Recap
- Tools
- Chapter 8 Dynamic Analysis Lab
- Setting Up the Lab
- Choose the Hardware
- Install the Operating System
- Make the Lab Malware Friendly
- Anonymize the Lab
- Isolate the Lab
- Restoring to a Clean State
- Virtualized Environment Clean State Restoration
- Bare-Metal Environment Clean State Restoration
- Backing Up and Restoring
- The Golden Image
- Host OS
- Other Systems Supporting the Lab
- Recap
- Tools
- Part III Malware Inspection
- Chapter 9 The Portable Executable File