Learning Malware Analysis
暫譯: 學習惡意程式分析
Monnappa K A
- 出版商: Packt Publishing
- 出版日期: 2018-06-29
- 售價: $1,925
- 貴賓價: 9.5 折 $1,829
- 語言: 英文
- 頁數: 510
- 裝訂: Paperback
- ISBN: 1788392507
- ISBN-13: 9781788392501
-
相關分類:
資訊安全、Penetration-test
立即出貨 (庫存=1)
買這商品的人也買了...
-
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Paperback)$2,100$1,995 -
$2,250The IDA Pro Book : The Unofficial Guide to the World's Most Popular Disassembler, 2/e (Paperback) -
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws, 2/e (Paperback)$1,980$1,881 -
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software (Paperback)$2,100$1,995 -
啊哈!圖解演算法必學基礎$350$298 -
Windows 軟體安全實務 -- 緩衝區溢位攻擊$480$379 -
The Antivirus Hacker's Handbook (Paperback)$1,750$1,663 -
黑帽 Python | 給駭客與滲透測試者的 Python 開發指南 (Black Hat Python: Python Programming for Hackers and Pentesters)$400$316 -
CISSP All-in-One Exam Guide, 7/e (Hardcover)$2,970$2,822 -
Effective Debugging 中文版 | 軟體與系統除錯的 66 個具體作法 (Effective Debugging: 66 Specific Ways to Debug Software and Systems) (書況略舊,不介意在下單)$450$383 -
$1,782Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework -
勒索病毒程式設計 : 揭秘你所不知道的勒索病毒$480$374 -
The Hacker Playbook 3: Practical Guide To Penetration Testing (Paperback)$1,340$1,313 -
CISSP Official (ISC)2 Practice Tests, 2/e (Paperback)$1,500$1,425 -
Practical Web Penetration Testing$1,630$1,549 -
$1,782Malware Data Science: Attack Detection and Attribution -
$1,188Mastering Malware Analysis -
$312透視 APT — 賽博空間的高級威脅 -
Kali Linux 滲透測試工具|花小錢做資安,你也是防駭高手, 3/e$880$748 -
$990Web Security for Developers: Real Threats, Practical Defense (Paperback) -
Python 非同步設計|使用 Asyncio (Using Asyncio in Python )$480$379 -
軟體架構原理|工程方法 (Fundamentals of Software Architecture: A Comprehensive Guide to Patterns, Characteristics, and Best Practices)$680$537 -
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 9/e (Paperback)$2,650$2,518 -
$403安卓 Frida 逆向與協議分析 -
$505LangChain 入門指南:構建高可復用、可擴展的 LLM 應用程序
商品描述
Key Features
- Gets you up and running with the key concepts of malware analysis
- Learn the art of detecting, analyzing and investigating malware threats
- Practical use of malware analysis using different tools and techniques.
- Learn the concepts using real world examples
Book Description
Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, Data centers, private and public organizations; detecting, responding and investigating such intrusions are critical to information security professionals. Malware analysis and memory forensics have become a must have skill for fighting advanced malware, targeted attacks and security breaches.
This book teaches concepts, techniques, and tools to understand the behavior and characteristics of malware by using malware analysis and it also teaches the techniques to investigate and hunt malwares using memory forensics.
This book will introduce readers to the basics of malware analysis, Windows internals and it then gradually progresses deep into more advanced concepts of code analysis & memory forensics. This book uses real world malware samples and infected memory images to help readers gain a better understanding of the subject so that the readers will be equipped with skills required to analyze, investigate and respond to malware related incidents.
What you will learn
- Create a safe and isolated lab environment for malware analysis
- Tools, concepts & techniques to perform malware analysis using static, dynamic, code and memory analysis/forensics
- Extracting the metadata associated with malware
- Determining malware interaction with system
- Reverse engineering and debugging using code analysis tools like IDA pro and x64dbg
- Reverse engineering various malware functionalities
- Reverse engineering & decoding the common encoding/encryption algorithms.
- Techniques to investigate & hunt malware using memory forensics.
- Build a custom sandbox to automate malware analysis
商品描述(中文翻譯)
**主要特點**
- 讓您快速掌握惡意程式分析的關鍵概念
- 學習檢測、分析和調查惡意程式威脅的技巧
- 實際使用不同工具和技術進行惡意程式分析
- 通過真實世界的例子學習這些概念
**書籍描述**
惡意程式分析和記憶體取證是用於逆向工程、數位取證和事件響應的強大分析和調查技術。隨著對手變得越來越複雜,並對關鍵基礎設施、數據中心、私營和公共組織發動先進的惡意程式攻擊;檢測、響應和調查這些入侵對於資訊安全專業人員至關重要。惡意程式分析和記憶體取證已成為對抗先進惡意程式、針對性攻擊和安全漏洞的必備技能。
本書教授使用惡意程式分析來理解惡意程式的行為和特徵的概念、技術和工具,並教授使用記憶體取證調查和追蹤惡意程式的技術。
本書將向讀者介紹惡意程式分析、Windows 內部結構的基本知識,然後逐步深入更高級的代碼分析和記憶體取證概念。本書使用真實的惡意程式樣本和感染的記憶體映像,幫助讀者更好地理解主題,使讀者具備分析、調查和響應與惡意程式相關事件所需的技能。
**您將學到的內容**
- 創建一個安全且隔離的實驗室環境以進行惡意程式分析
- 使用靜態、動態、代碼和記憶體分析/取證進行惡意程式分析的工具、概念和技術
- 提取與惡意程式相關的元數據
- 確定惡意程式與系統的互動
- 使用 IDA Pro 和 x64dbg 等代碼分析工具進行逆向工程和調試
- 逆向工程各種惡意程式功能
- 逆向工程和解碼常見的編碼/加密算法
- 使用記憶體取證調查和追蹤惡意程式的技術
- 建立自定義沙盒以自動化惡意程式分析








