Evasive Malware: Understanding Deceptive and Self-Defending Threats 283886

Код товару: 283886Паперова книга
  • ISBN
    978-1718503267
  • Бренд
  • Автор
  • Рік
    2024
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі
Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.

We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use a little help with analysis now and then. Evasive Malware will introduce you to the evasion techniques used by today’s malicious software and show you how to defeat them.

Following a crash course on using static and dynamic code analysis to uncover malware’s true intentions, you’ll learn how malware weaponizes context awareness to detect and skirt virtual machines and sandboxes, plus the various tricks it uses to thwart analysis tools. You’ll explore the world of anti-reversing, from anti-disassembly methods and debugging interference to covert code execution and misdirection tactics. You’ll also delve into defense evasion, from process injection and rootkits to fileless malware. Finally, you’ll dissect encoding, encryption, and the complexities of malware obfuscators and packers to uncover the evil within.

You’ll learn how malware:
  • Abuses legitimate components of Windows, like the Windows API and LOLBins, to run undetected
  • Uses environmental quirks and context awareness, like CPU timing and hypervisor enumeration, to detect attempts at analysis
  • Bypasses network and endpoint defenses using passive circumvention techniques, like obfuscation and mutation, and active techniques, like unhooking and tampering
  • Detects debuggers and circumvents dynamic and static code analysis
You’ll also find tips for building a malware analysis lab and tuning it to better counter anti-analysis techniques in malware. Whether you’re a frontline defender, a forensic analyst, a detection engineer, or a researcher, Evasive Malware will arm you with the knowledge and skills you need to outmaneuver the stealthiest of today’s cyber adversaries.

About the Author
Kyle Cucci has over 17 years in cybersecurity and IT, including roles as a malware analyst and detection engineer with Proofpoint’s Threat Research team and leader of the forensic investigations and malware research teams at Deutsche Bank. Cucci regularly speaks at security conferences and has led international trainings and workshops on topics such as malware analysis and security engineering. In his free time, Cucci enjoys contributing to the community via open source tooling, research, and blogging.
2'100 ₴
Купити
Monobank
до 10 платежей
от 236 ₴ / міс.
  • Нова Пошта
    Безкоштовно від 3'000,00 ₴
  • Укрпошта
    Безкоштовно від 1'000,00 ₴
  • Meest Пошта
    Безкоштовно від 3'000,00 ₴
Evasive Malware: Understanding Deceptive and Self-Defending Threats - фото 1
Evasive Malware: Understanding Deceptive and Self-Defending Threats - фото 2
Evasive Malware: Understanding Deceptive and Self-Defending Threats - фото 3
Evasive Malware: Understanding Deceptive and Self-Defending Threats - фото 4
Evasive Malware: Understanding Deceptive and Self-Defending Threats - фото 5
Evasive Malware: Understanding Deceptive and Self-Defending Threats - фото 6
Evasive Malware: Understanding Deceptive and Self-Defending Threats - фото 7
Evasive Malware: Understanding Deceptive and Self-Defending Threats - фото 8
Evasive Malware: Understanding Deceptive and Self-Defending Threats - фото 9
Evasive Malware: Understanding Deceptive and Self-Defending Threats - фото 10

Характеристики

  • Бренд
  • Автор
  • Категорія
    Програмування
  • Рік
    2024
  • Сторінок
    488
  • Формат
    165х235 мм
  • Обкладинка
    М'яка
  • Тип паперу
    Офсетний
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі

Від видавця

Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.

We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use a little help with analysis now and then. Evasive Malware will introduce you to the evasion techniques used by today’s malicious software and show you how to defeat them.

Following a crash course on using static and dynamic code analysis to uncover malware’s true intentions, you’ll learn how malware weaponizes context awareness to detect and skirt virtual machines and sandboxes, plus the various tricks it uses to thwart analysis tools. You’ll explore the world of anti-reversing, from anti-disassembly methods and debugging interference to covert code execution and misdirection tactics. You’ll also delve into defense evasion, from process injection and rootkits to fileless malware. Finally, you’ll dissect encoding, encryption, and the complexities of malware obfuscators and packers to uncover the evil within.

You’ll learn how malware:
  • Abuses legitimate components of Windows, like the Windows API and LOLBins, to run undetected
  • Uses environmental quirks and context awareness, like CPU timing and hypervisor enumeration, to detect attempts at analysis
  • Bypasses network and endpoint defenses using passive circumvention techniques, like obfuscation and mutation, and active techniques, like unhooking and tampering
  • Detects debuggers and circumvents dynamic and static code analysis
You’ll also find tips for building a malware analysis lab and tuning it to better counter anti-analysis techniques in malware. Whether you’re a frontline defender, a forensic analyst, a detection engineer, or a researcher, Evasive Malware will arm you with the knowledge and skills you need to outmaneuver the stealthiest of today’s cyber adversaries.

About the Author
Kyle Cucci has over 17 years in cybersecurity and IT, including roles as a malware analyst and detection engineer with Proofpoint’s Threat Research team and leader of the forensic investigations and malware research teams at Deutsche Bank. Cucci regularly speaks at security conferences and has led international trainings and workshops on topics such as malware analysis and security engineering. In his free time, Cucci enjoys contributing to the community via open source tooling, research, and blogging.

Відгуки про Evasive Malware: Understanding Deceptive and Self-Defending Threats

Evasive Malware: Understanding Deceptive and Self-Defending Threats
Evasive Malware: Understanding Deceptive and Self-Defending Threats
2'100 ₴
Купити
Персонально для вас
Cryptography and Cryptanalysis in MATLAB. 1st Ed.
244674
Marius Iulian Mihailescu, Stefania Loredana Nita
1'900 ₴
Black Hat Bash: Creative Scripting for Hackers and Pentesters
283851
Dolev FarhiNick Aleks
1'900 ₴
The Hack Is Back: Techniques to Beat Hackers at Their Own Games 1st Edition
286458
Jesse VarsaloneChristopher Haller
1'900 ₴
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
244753
Andrew Martin, Michael Hausenblas
2'100 ₴
Metasploit, 2nd Edition
283887
Dave KennedyJim O'GormanDevon KearnsMati AharoniDr. Daniel G. Graham
2'100 ₴
Data Engineering for Cybersecurity
303122
James Bonifield
2'100 ₴
Windows Forensics: Understand Analysis Techniques for Your Windows First Edition
306388
Chuck EasttomWilliam ButlerJessica PhelanRamya Sai BhagavatulaSean SteuberKarely RodriguezVictoria Indy BalkissoonZehra Naseer
2'200 ₴
Security in Computing, 6th Edition
286459
Pfleeger CharlesPfleeger Shari LawrenceColes-Kemp Lizzie
2'300 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
261468
Michael KoflerKlaus GebeshuberPeter KloepFrank NeugebauerAndre ZingsheimThomas HacknerMarkus WidlRoland AignerStefan KaniaTobias ScheibleMatthias Wubbeling
2'700 ₴
Docker: Up & Running; Shipping Reliable Containers in Production 3rd Edition
274003
Sean KaneKarl Matthias
1'700 ₴
Data Engineering for Cybersecurity
303122
James Bonifield
2'100 ₴
Data Storytelling with Altair and AI
289715
Angelica Lo Duca
1'800 ₴