Jump to ratings and reviews
Rate this book

Tools and Techniques for Fighting Malicious Code: Malware Analyst's Cookbook and DVD

Rate this book
This book is a collection of problems, solutions, and practical examples designed to enhance the analytical capabilities of anyone who works with malware. Whether you're tracking a Trojan across networks, performing an in-depth binary analysis, or inspecting a machine for potential infections, the recipes in this book will help you achieve your goals more quickly and accurately. The book goes beyond how to tackle challenges using free or inexpensive tools. It also includes a generous amount of source code in C, Python, and Perl that show how to extend your favorite tools or build your own from scratch. The DVD contains original, never-before-published custom programs from the authors to demonstrate concepts in the recipes. This tool set includes files required to complete reverse-engineering challenges and files required for the reader to follow along with exhibits/figures in the book. About The Author: Michael Hale Ligh is a malicious code analyst at Verisign iDefense known for locating critical flaws in Tumbleweed, Novell, Symark, and F5. He has won malware related contests/challenges run by SANS, Honeynet, and Hacker Challenge, has a master's degree in forensic computer investigation and has taught advanced malware analysis courses in Brazil, China, USA, and England. Steven Adair is a security researcher with The Shadowserver Foundation and a Principal Architect at eTouch Federal Systems. He analyzes malware, tracks botnets, and deals with cyber attacks of all kinds with an emphasis on those linked to cyber espionage. Matt Richard is Malicious Code Operations Lead at Raytheon Corporation and previously ran a managed security service used by 130 banks and credit unions. He has written a number of security tools. Table Of Contents: Introduction. On The Book's DVD. ?Anonymizing Your Activities. ?Honeypots. ?Malware Classification. ?Sandboxes and Multi-AV Scanners. ?Researching Domains and IP Addresses. ?Documents, Shellcode, and URLs. ?Malware Labs. ?

744 pages, Paperback

First published October 1, 2010

37 people are currently reading
580 people want to read

About the author

Michael Hale Ligh

3 books4 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
86 (46%)
4 stars
57 (30%)
3 stars
35 (19%)
2 stars
5 (2%)
1 star
1 (<1%)
Displaying 1 - 7 of 7 reviews
Profile Image for Abhinav Singh.
Author 46 books6 followers
October 14, 2014
The content of the book is very well organized. It can be a good starting point for someone who is new to Malware analysis but it might fall short of expectations for experienced people. The reason is because the major content of the book revolves around using different tools to perform certain task. The book could have reached to an advance level by detailing the last few chapters involving static analysis, debugging etc.
Profile Image for Ayoub.
77 reviews9 followers
July 18, 2016
long and informative journey through this guide, can't find better technical book when it comes to the nice blend between theory and practice. It dives deep into the detailed (static and dynamic) analysis of malware despite the platform. Discusses diversity of tools utilized across the security field including, forensics, pen testing and analysis. Provides specialists with recipes of how-to and do-to. In short, amazing and highly recommended.
80 reviews1 follower
September 6, 2021
Must better material available elsewhere.
46 reviews4 followers
June 30, 2015
Good but too much Volatility

Overall it was a really good book but the last couple of chapters focus completely on volatility and not too well if you want better understanding of memory forensics including malware just look at the book the Art of Memory Forensics
Profile Image for Bill Dean.
11 reviews4 followers
February 10, 2013
Excellent book on malware analysis and techniques. The DVD that comes with it is incredibly helpful as well due to the amount of time that it saves inputting code for analysis.
Displaying 1 - 7 of 7 reviews

Can't find what you're looking for?

Get help and learn more about the design.