Dive into the fascinating and terrifying world of evasive malware - malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analysing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you'll learn about the evasive manoeuvres that malware programs use to determine whether they're being analysed and the tricks they employ to avoid detection. You'll explore the ways malware circumvents security controls, such as network or endpoint defence bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you'll build your very own anti-evasion analysis lab. You'll learn: Modern evasive malware threats, anti-analysis techniques used in malware, how malware bypasses and circumvents security controls, how malware uses victim targeting and profiling techniques, how malware uses anti-forensics and file-less techniques, how to perform malware analysis and reverse engineering on evasive programs.
Dive into the fascinating and terrifying world of evasive malware - malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analysing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you''ll learn about the evasive manoeuvres that malware programs use to determine whether they''re being analysed and the tricks they employ to avoid detection. You''ll explore the ways malware circumvents security controls, such as network or endpoint defence bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you''ll build your very own anti-evasion analysis lab. You''ll learn: Modern evasive malware threats, anti-analysis techniques used in malware, how malware bypasses and circumvents security controls, how malware uses victim targeting and profiling techniques, how malware uses anti-forensics and file-less techniques, how to perform malware analysis and reverse engineering on evasive programs.
Get Evasive Malware by at the best price and quality guranteed only at Werezi Africa largest book ecommerce store. The book was published by No Starch Press,US and it has pages. Enjoy Shopping Best Offers & Deals on books Online from Werezi - Receive at your doorstep - Fast Delivery - Secure mode of Payment