Usr6 Posted March 3, 2012 Report Posted March 3, 2012 Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you’ll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You’ll learn how to:Set up a safe virtual environment to analyze malwareQuickly extract network signatures and host-based indicatorsUse key analysis tools like IDA Pro, OllyDbg, and WinDbgOvercome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniquesUse your newfound knowledge of Windows internals for malware analysisDevelop a methodology for unpacking malware and get practical experience with five of the most popular packersAnalyze special cases of malware with shellcode, C++, and 64-bit codeTable of Contents:Part 1: Basic Analysis Chapter 1: Basic Static Techniques Chapter 2: Malware Analysis in Virtual Machines Chapter 3: Basic Dynamic AnalysisPart 2: Advanced Static Analysis Chapter 4: A Crash Course in x86 Disassembly Chapter 5: IDA Pro Chapter 6: Recognizing C Code Constructs in Assembly Chapter 7: Analyzing Malicious Windows ProgramsPart 3: Advanced Dynamic Analysis Chapter 8: Debugging Chapter 9: OllyDbg Chapter 10: Kernel Debugging with WinDbgPart 4: Malware Functionality Chapter 11: Malware Behavior Chapter 12: Covert Malware Launching Chapter 13: Data Encoding Chapter 14: Malware-Focused Network SignaturesPart 5: Anti-Reverse-Engineering Chapter 15: Anti-Disassembly Chapter 16: Anti-Debugging Chapter 17: Anti-Virtual Machine Techniques Chapter 18: Packers and UnpackingPart 6: Special Topics Chapter 19: Shellcode Analysis Chapter 20: C++ Analysis Chapter 21: 64-Bit MalwareAppendix A: Important Windows FunctionsAppendix B: Tools for Malware AnalysisAppendix C: Solutions to LabsDownloadSursa Quote