Malware analyst's cookbook and DVD tools and techniques for fighting malicious code

A computer forensics "how-to" for fighting malicious code andanalyzing incidents With our ever-increasing reliance on computers comes anever-growing risk of malware. Security professionals will findplenty of solutions in this book to the problems posed by viruses,Trojan horses, worms, spyw...

Full description

Saved in:
Bibliographic Details
Main Authors: Ligh, Michael Hale (Author), Adair, Steven (Author), Hartstein, Blake (Author), Richard, Matthew (Author)
Format: Book
Language:English
Published: Indianapolis, IN Wiley Publishing Inc. 2011
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Anonymizing your activities
  • Honeypots
  • Malware classification
  • Sandboxes and multi-AV scanners
  • Researching domains and IP addresses
  • Documents, shellcode, and URLs
  • Malware labs
  • Automation
  • Dynamic analysis
  • Malware forensics
  • Debugging malware
  • De-obfuscation
  • Working with DLLs
  • Kernel debugging
  • Memory forensics with volatility
  • Memory forensics: code injection and extraction
  • Memory forensics: rootkits
  • Memory forensics: network and registry