Advanced malware analysis /

A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge...

Full description

Saved in:
Bibliographic Details
Main Author: Elisan, Christopher C. (Author)
Format: Electronic eBook
Language:English
Published: New York : McGraw-Hill Education, [2015]
Edition:Version 1.0.
Subjects:
Online Access:CONNECT

MARC

LEADER 00000cam a2200000Ii 4500
001 in00006063694
006 m o d
007 cr unu||||||||
008 151112s2015 nyua ob 001 0 eng d
005 20220713134152.8
035 |a 1WRLDSHRocn928939801 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCA  |d TOH  |d EBLCP  |d YDX  |d CZL  |d OCLCO 
020 |z 9780071819749 
020 |a 9780071819756 
020 |a 0071819754 
035 |a (OCoLC)928939801 
037 |a CL0500000672  |b Safari Books Online 
050 4 |a QA76.76.C68  |b E445 2015 
082 0 4 |a 005.8/4 
049 |a TXMM 
100 1 |a Elisan, Christopher C.,  |e author. 
245 1 0 |a Advanced malware analysis /  |c Christopher C. Elisan. 
250 |a Version 1.0. 
264 1 |a New York :  |b McGraw-Hill Education,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents at a Glance -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I Malware Blueprint -- Chapter 1 Malware Analysis 101 -- Malware Analysis -- Malware Analysis and Reverse Engineering -- Types of Malware Analysis -- Purpose of Malware Analysis -- Limitations of Malware Analysis -- The Malware Analysis Process -- The Effective Malware Analyst -- Familiarization with Malware -- Familiarization with Analysis Tools -- Patience -- Recap -- Chapter 2 Malware Taxonomy -- Malware Classes -- Infectors -- Network Worms 
505 8 |a Trojan Horse -- Backdoors -- Remote-Access Trojan -- Information Stealers -- Ransomware -- Scareware -- Fakeware -- Greyware -- Recap -- Chapter 3 Malware Deployment -- Malware Infection Vectors -- Speed -- Stealth -- Coverage -- Shelf Life -- Types of Malware Infection Vectors -- Physical Media -- E-mails -- Instant Messaging and Chat -- Social Networking -- URL Links -- File Shares -- Software Vulnerabilities -- Potential Infection Vectors -- Recap -- Chapter 4 Protective Mechanisms -- The Two States of Malware -- Static Malware -- Dynamic Malware -- Protective Mechanisms 
505 8 |a Static Malware Protective Mechanisms -- Dynamic Malware Protective Mechanisms -- Recap -- Chapter 5 Malware Dependencies -- Dependency Types -- Environment Dependencies -- Program Dependencies -- Timing Dependencies -- Event Dependencies -- User Dependencies -- File Dependencies -- Recap -- Part II Malware Research Lab -- Chapter 6 Malware Collection -- Your Own Backyard -- Scan for Malicious Files -- Look for Active Rootkits -- Inspect Startup Programs -- Inspect Running Processes -- Extract Suspicious Files -- Free Sources -- Contagio -- KernelMode.info -- MalShare.com -- Malware.lu 
505 8 |a Malware Blacklist -- Malwarebytes Forum -- Malekal's Forum -- Open Malware -- Tuts4You -- VirusShare.com -- VX Heaven -- Malware Trackers -- Research Mailing Lists -- Sample Exchange -- Commercial Sources -- Honeypots -- Dionaea -- Recap -- Tools -- Chapter 7 Static Analysis Lab -- The Static Analysis Lab -- Host File Inspection Tools -- Mitigate Possible Infection -- Mitigate Becoming a Malware Staging Point -- Anonymous Communication -- Setting Up the Lab -- Choose the Hardware -- Install the Operating System -- Harden the Lab -- Anonymize the Lab -- Isolate the Lab 
505 8 |a The Virtualized Static Analysis Lab -- Backing Up and Restoring -- Recap -- Tools -- Chapter 8 Dynamic Analysis Lab -- Setting Up the Lab -- Choose the Hardware -- Install the Operating System -- Make the Lab Malware Friendly -- Anonymize the Lab -- Isolate the Lab -- Restoring to a Clean State -- Virtualized Environment Clean State Restoration -- Bare-Metal Environment Clean State Restoration -- Backing Up and Restoring -- The Golden Image -- Host OS -- Other Systems Supporting the Lab -- Recap -- Tools -- Part III Malware Inspection -- Chapter 9 The Portable Executable File 
520 |a A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware. After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then, you'll learn how to use dozens of malware analysis tools, organize data, and create metrics-rich reports. A crucial tool for combatting malware--which currently hits each second globally Filled with undocumented methods for customizing dozens of analysis software tools for very specific uses Leads you through a malware blueprint first, then lab setup, and finally analysis and reporting activities Every tool explained in this book is available in every country around the world. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
650 0 |a Malware (Computer software) 
650 0 |a Computer security. 
730 0 |a WORLDSHARE SUB RECORDS 
776 0 8 |i Print version:  |a Elisan, Christopher C.  |t Advanced malware analysis.  |d New York : McGraw-Hill Education, [2015]  |z 9780071819749  |w (OCoLC)916571163 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780071819756/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s ee18534a-9a45-4bbf-829b-fb73bc81dda6  |i 13df6998-2e96-4756-9a9e-e9e06b5601b4  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA76.76.C68 E445 2015  |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780071819756/?ar  |z CONNECT