Table of Contents for
Windows Malware Analysis Essentials
Close
Version ebook
/
Retour
Windows Malware Analysis Essentials
by Victor Marak
Published by Packt Publishing, 2015
Cover
Table of Contents
Windows Malware Analysis Essentials
Windows Malware Analysis Essentials
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
1. Down the Rabbit Hole
Signed numbers and complements
Boolean logic and bit masks
Breathing in the ephemeral realm
Sharpening the scalpel
Performing binary reconnaissance
Exploring the universe of binaries on PE Explorer
Getting to know IDA Pro
Entropy
Summary
2. Dancing with the Dead
Registers
The initiation ritual
Preparing the alter
Code constructs in x86 disassembly
Summary
3. Performing a Séance Session
Debriefing – seeing the forest for the trees
Preparing for D-Day – lab setup
Whippin' out your arsenal
Summoning the demon!
Post infection
Exorcism and the aftermath – debrief finale!
Summary
4. Traversing Across Parallel Dimensions
Alice in kernel land – kernel debugging with IDA Pro, Virtual KD, and VMware
Summary
5. Good versus Evil – Ogre Wars
Encoding/decoding – XOR Deobfuscation
Malicious Web Script Analysis
Byte code decompilers
Document analysis
Redline – malware memory forensics
Malware intelligence
Summary
Index
Next
Next Chapter
Table of Contents
Next
Next Chapter
Table of Contents