You’ll learn how to destroy malware to see how it works, the damage it has done, clean up your network thoroughly, and make sure malware never reappears. On the pages with detailed specimens, you can look over the shoulder as the pros do. Practical exercises throughout the book encourage you to practice and synthesize your skills when preparing real malware samples. Use your new knowledge of Windows internal components for malware analysisĭevelop a method for decompressing malware and gain hands-on experience with five of the leading packagersĪnalyze specific malware cases using shellcode, C ++ and 64-bit codes Overcome malware tips such as obfuscation, anti-disassembly, anti-debugging and virtual machine techniques Use key analysis tools such as IDA Pro, OllyDbg and WinDbg Quickly extract network signatures and host-based flags
With this manual as a guide, you can safely analyze, debug and disassemble any malicious software that may be blocking you.Ĭonfigure a secure virtual environment to scan for malware
If malware violates your defenses, you must act quickly to fix current infections and prevent future infections.įor those who want to get a head start on the latest malware, Practical Malware Analysis offers an introduction to the tools and techniques used by professional analysts. Malware analysis is a big deal and attacks can be very expensive for a company. * Provides an introduction to advanced reverse engineering, reverse engineering of disassembly code and decryption of assembly language.ģ – Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software * Helps developers address security vulnerabilities by showing users how hackers use reverse engineering techniques to crack copy protection systems and identify software targets used against viruses and other malware. * The first popular book to show how reverse engineering software can help guard against security threats, accelerate development and uncover the secrets of competing products. In addition, the author explains how to reverse engineer a library of third-party software to improve the interface and reverse engineer a competitor’s software to create a more efficient product. The book is divided into two parts: the first deals with safety-related reverse engineering and the second with the more practical aspects of reverse engineering. In this book, readers are introduced to practical and detailed techniques of software reverse engineering.
Start with a basic introduction to reverse engineering (including internal computer components, operating systems, and assembly language) and discuss the various aspects. Practical reverse engineering: The use of x86, 圆4, ARM, Windows kernel tools and inversion tools is an important and up-to-date guide for many IT professionals.Ģ – Reversing: Secrets of Reverse Engineering Includes a bonus chapter on reverse engineering tools Provides a special description of the Windows kernel-mode code (rootkits / drivers), a topic rarely discussed elsewhere, and explains step-by-step how to parse the drivers.ĭemystifies subjects with a steep learning curve Includes advanced x86, 圆4, and RISC (ARM) machine architectures, as well as techniques for deobfuscating and protecting virtual machines Provides a systematic approach to understanding reverse engineering using hands-on exercises and practical examples Better still, it offers a systematic approach to the material with many practical exercises and practical examples.
Rootkits and code drivers in Windows kernel mode Virtual Machine Protection Techniques and much more. The book covers x86, 圆4 and ARM (the first book to cover all three). Practical Reverse Engineering Under the guise of reverse engineering, security analysts, security engineers and system programmers learn to use the same processes to stop hackers. Now, the good ones can counteract these threats with the same tools. Hackers can reverse engineer systems and exploit what they find with scary results. Reverse engineering analyzes and understands hardware or software without access to source code or design documents.