Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of malware. Security professionals will findplenty of solutions in this book to the problems posed by viruses,Trojan horses, worms, spyw...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley Publishing Inc.
2011
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Anonymizing your activities
- Honeypots
- Malware classification
- Sandboxes and multi-AV scanners
- Researching domains and IP addresses
- Documents, shellcode, and URLs
- Malware labs
- Automation
- Dynamic analysis
- Malware forensics
- Debugging malware
- De-obfuscation
- Working with DLLs
- Kernel debugging
- Memory forensics with volatility
- Memory forensics: code injection and extraction
- Memory forensics: rootkits
- Memory forensics: network and registry


