Practical_Malware_Analysis.pdf
(
9672 KB
)
Pobierz
PRAISE FOR
PRACTICAL MALWARE ANALYSIS
“An excellent crash course in malware analysis.”
—
Dino Dai Zovi
, I
NDEPENDENT
S
ECURITY
C
ONSULTANT
“. . . the most comprehensive guide to analysis of malware, offering detailed
coverage of all the essential skills required to understand the specific
challenges presented by modern malware.”
—
Chris Eagle
, S
ENIOR
L
ECTURER
OF
C
OMPUTER
S
CIENCE
, N
AVAL
P
OSTGRADUATE
S
CHOOL
“A hands-on introduction to malware analysis. I'd recommend it to anyone
who wants to dissect Windows malware.”
—
Ilfak Guilfanov
, C
REATOR
OF
IDA P
RO
“. . . a great introduction to malware analysis. All chapters contain detailed
technical explanations and hands-on lab exercises to get you immediate
exposure to real malware.”
—
Sebastian Porst
, G
OOGLE
S
OFTWARE
E
NGINEER
“. . . brings reverse-engineering to readers of all skill levels. Technically
rich and accessible, the labs will lead you to a deeper understanding of the
art and science of reverse-engineering. I strongly recommend this book for
beginners and experts alike.”
—
Danny Quist
, P
H
D, F
OUNDER
OF
O
FFENSIVE
C
OMPUTING
“If you only read one malware book or are looking to break into the world of
malware analysis, this is the book to get.”
—
Patrick Engbretson
, IA P
ROFESSOR
, D
AKOTA
S
TATE
U
NIVERSITY
AND
AUTHOR
OF
The Basics of Hacking and Pen Testing
“. . . an excellent addition to the course materials for an advanced graduate
level course on Software Security or Intrusion Detection Systems. The labs
are especially useful to students in teaching the methods to reverse-engineer,
analyze, and understand malicious software.”
—
Sal Stolfo
, P
ROFESSOR
, C
OLUMBIA
U
NIVERSITY
WARNING
This is a book about malware. The links and software described
in this book are
malicious
. Exercise extreme caution when executing
unknown code and visiting untrusted URLs.
For hints about creating a safe virtualized environment for malware
analysis, visit Chapter 2. Don’t be stupid; secure your environment.
PRACTICAL
MALWARE ANALYSIS
The Hands-On Guide to
Dissecting Malicious
Software
by Michael Sikorski and Andrew Honig
San Francisco
PRACTICAL MALWARE ANALYSIS.
Copyright © 2012 by Michael Sikorski and Andrew Honig.
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior
written permission of the copyright owner and the publisher.
16 15 14 13 12
1 2 3 4 5 6 7 8 9
ISBN-10: 1-59327-290-1
ISBN-13: 978-1-59327-290-6
Publisher: William Pollock
Production Editor: Alison Law
Cover Illustration: Hugh D’Andrade
Interior Design: Octopod Studios
Developmental Editors: William Pollock and Tyler Ortman
Technical Reviewer: Stephen Lawler
Copyeditor: Marilyn Smith
Compositor: Riley Hoffman
Proofreader: Irene Barnard
Indexer: Nancy Guenther
For information on book distributors or translations, please contact No Starch Press, Inc. directly:
No Starch Press, Inc.
38 Ringold Street, San Francisco, CA 94103
phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com
Library of Congress Cataloging-in-Publication Data
A catalog record of this book is available from the Library of Congress.
No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and
company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark
symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the
benefit of the trademark owner, with no intention of infringement of the trademark.
The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been
taken in the preparation of this work, neither the authors nor No Starch Press, Inc. shall have any liability to any
person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the
information contained in it.
Plik z chomika:
kufel_007
Inne pliki z tego folderu:
The IoT Hacker’s A Practical Guide to Hacking the Internet of Things.pdf
(18975 KB)
security-cissp-all-in-one-exam-guide-6th-edition.pdf
(60183 KB)
ethical-hacking-a-hands-on-introduction-to-breaking-in.pdf
(8872 KB)
Mastering Reverse Engineering Re-engineer your ethical hacking skills by Reginald Wong.pdf
(14578 KB)
Black-Hat-Go_Go-Programming-For-Hackers-and-Pentesters.pdf
(23456 KB)
Inne foldery tego chomika:
assembly
C#
C++
Hakin9 hacking
ISO
Zgłoś jeśli
naruszono regulamin