Evasive Malware

Evasive Malware
Author :
Publisher : No Starch Press
Total Pages : 488
Release :
ISBN-10 : 9781718503267
ISBN-13 : 1718503261
Rating : 4/5 (261 Downloads)

Book Synopsis Evasive Malware by : Kyle Cucci

Download or read book Evasive Malware written by Kyle Cucci and published by No Starch Press. This book was released on 2024-09-10 with total page 488 pages. Available in PDF, EPUB and Kindle. Book excerpt: Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools. We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use a little help with analysis now and then. Evasive Malware will introduce you to the evasion techniques used by today’s malicious software and show you how to defeat them. Following a crash course on using static and dynamic code analysis to uncover malware’s true intentions, you’ll learn how malware weaponizes context awareness to detect and skirt virtual machines and sandboxes, plus the various tricks it uses to thwart analysis tools. You’ll explore the world of anti-reversing, from anti-disassembly methods and debugging interference to covert code execution and misdirection tactics. You’ll also delve into defense evasion, from process injection and rootkits to fileless malware. Finally, you’ll dissect encoding, encryption, and the complexities of malware obfuscators and packers to uncover the evil within. You’ll learn how malware: Abuses legitimate components of Windows, like the Windows API and LOLBins, to run undetected Uses environmental quirks and context awareness, like CPU timing and hypervisor enumeration, to detect attempts at analysis Bypasses network and endpoint defenses using passive circumvention techniques, like obfuscation and mutation, and active techniques, like unhooking and tampering Detects debuggers and circumvents dynamic and static code analysis You’ll also find tips for building a malware analysis lab and tuning it to better counter anti-analysis techniques in malware. Whether you’re a frontline defender, a forensic analyst, a detection engineer, or a researcher, Evasive Malware will arm you with the knowledge and skills you need to outmaneuver the stealthiest of today’s cyber adversaries.

Evasive Malware Related Books

Evasive Malware
Language: en
Pages: 488
Authors: Kyle Cucci
Categories: Computers
Type: BOOK - Published: 2024-09-10 - Publisher: No Starch Press

GET EBOOK

Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic
Practical Malware Analysis
Language: en
Pages: 802
Authors: Michael Sikorski
Categories: Computers
Type: BOOK - Published: 2012-02-01 - Publisher: No Starch Press

GET EBOOK

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections
Computer Security – ESORICS 2021
Language: en
Pages: 798
Authors: Elisa Bertino
Categories: Computers
Type: BOOK - Published: 2021-09-29 - Publisher: Springer Nature

GET EBOOK

The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took plac
Ultimate Cyberwarfare for Evasive Cyber Tactics 9788196890315
Language: en
Pages: 225
Authors: Chang Tan
Categories: Computers
Type: BOOK - Published: 2024-01-31 - Publisher: Orange Education Pvt Ltd

GET EBOOK

Attackers have to be only right once, but just one mistake will permanently undo them. KEY FEATURES ● Explore the nuances of strategic offensive and defensive
Detection of Intrusions and Malware, and Vulnerability Assessment
Language: en
Pages: 408
Authors: Cristiano Giuffrida
Categories: Computers
Type: BOOK - Published: 2018-06-21 - Publisher: Springer

GET EBOOK

This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA