This book is a collection of problems, solutions, and practical examples designed to enhance the analytical capabilities of anyone who works with malware. Whether you're tracking a Trojan across networks, performing an in-depth binary analysis, or inspecting a machine for potential infections, the recipes in this book will help you achieve your goals more quickly and accurately. The book goes beyond how to tackle challenges using free or inexpensive tools. It also includes a generous amount of source code in C, Python, and Perl that show how to extend your favorite tools or build your own from scratch. The DVD contains original, never-before-published custom programs from the authors to demonstrate concepts in the recipes. This tool set includes files required to complete reverse-engineering challenges and files required for the reader to follow along with exhibits/figures in the book. About The Author: Michael Hale Ligh is a malicious code analyst at Verisign iDefense known for locating critical flaws in Tumbleweed, Novell, Symark, and F5. He has won malware related contests/challenges run by SANS, Honeynet, and Hacker Challenge, has a master's degree in forensic computer investigation and has taught advanced malware analysis courses in Brazil, China, USA, and England. Steven Adair is a security researcher with The Shadowserver Foundation and a Principal Architect at eTouch Federal Systems. He analyzes malware, tracks botnets, and deals with cyber attacks of all kinds with an emphasis on those linked to cyber espionage. Matt Richard is Malicious Code Operations Lead at Raytheon Corporation and previously ran a managed security service used by 130 banks and credit unions. He has written a number of security tools. Table Of Contents: Introduction. On The Book's DVD. ?Anonymizing Your Activities. ?Honeypots. ?Malware Classification. ?Sandboxes and Multi-AV Scanners. ?Researching Domains and IP Addresses. ?Documents, Shellcode, and URLs. ?Malware Labs. ?
The content of the book is very well organized. It can be a good starting point for someone who is new to Malware analysis but it might fall short of expectations for experienced people. The reason is because the major content of the book revolves around using different tools to perform certain task. The book could have reached to an advance level by detailing the last few chapters involving static analysis, debugging etc.
long and informative journey through this guide, can't find better technical book when it comes to the nice blend between theory and practice. It dives deep into the detailed (static and dynamic) analysis of malware despite the platform. Discusses diversity of tools utilized across the security field including, forensics, pen testing and analysis. Provides specialists with recipes of how-to and do-to. In short, amazing and highly recommended.
Overall it was a really good book but the last couple of chapters focus completely on volatility and not too well if you want better understanding of memory forensics including malware just look at the book the Art of Memory Forensics
Excellent book on malware analysis and techniques. The DVD that comes with it is incredibly helpful as well due to the amount of time that it saves inputting code for analysis.