0% found this document useful (0 votes)
169 views

Learning Malware Analysis

The document outlines a comprehensive guide to malware analysis, covering various techniques and methodologies. It includes chapters on static and dynamic analysis, disassembly, debugging, and memory forensics. Each chapter delves into specific aspects of malware functionalities, obfuscation techniques, and detection methods.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
169 views

Learning Malware Analysis

The document outlines a comprehensive guide to malware analysis, covering various techniques and methodologies. It includes chapters on static and dynamic analysis, disassembly, debugging, and memory forensics. Each chapter delves into specific aspects of malware functionalities, obfuscation techniques, and detection methods.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 113

Chapter 1: Introduction to Malware Analysis

[2]
[3]
[4]
[5]
Chapter 2: Static Analysis

[6]
[7]
[8]
[9]
[ 10 ]
[ 11 ]
[ 12 ]
Chapter 3: Dynamic Analysis

[ 13 ]
[ 14 ]
[ 15 ]
[ 16 ]
[ 17 ]
[ 18 ]
[ 19 ]
[ 20 ]
Chapter 4: Assembly Language and
Disassembly Primer

[ 21 ]
[ 22 ]
[ 23 ]
[ 24 ]
[ 25 ]
[ 26 ]
[ 27 ]
[ 28 ]
[ 29 ]
[ 30 ]
[ 31 ]
Chapter 5: Disassembly Using IDA

[ 32 ]
[ 33 ]
[ 34 ]
[ 35 ]
[ 36 ]
[ 37 ]
[ 38 ]
[ 39 ]
[ 40 ]
Chapter 6: Debugging Malicious Binaries

[ 41 ]
[ 42 ]
[ 43 ]
[ 44 ]
[ 45 ]
[ 46 ]
[ 47 ]
[ 48 ]
[ 49 ]
[ 50 ]
[ 51 ]
[ 52 ]
Chapter 7: Malware Functionalities and
Persistence

[ 53 ]
[ 54 ]
[ 55 ]
[ 56 ]
[ 57 ]
[ 58 ]
[ 59 ]
[ 60 ]
[ 61 ]
[ 62 ]
Chapter 8: Code Injection and Hooking

[ 63 ]
[ 64 ]
[ 65 ]
[ 66 ]
[ 67 ]
[ 68 ]
[ 69 ]
[ 70 ]
[ 71 ]
[ 72 ]
[ 73 ]
[ 74 ]
[ 75 ]
[ 76 ]
[ 77 ]
[ 78 ]
[ 79 ]
Chapter 9: Malware Obfuscation Techniques

[ 80 ]
[ 81 ]
[ 82 ]
[ 83 ]
[ 84 ]
[ 85 ]
[ 86 ]
[ 87 ]
[ 88 ]
[ 89 ]
[ 90 ]
[ 91 ]
[ 92 ]
[ 93 ]
[ 94 ]
[ 95 ]
[ 96 ]
[ 97 ]
[ 98 ]
Chapter 10: Hunting Malware Using Memory
Forensics

[ 99 ]
[ 100 ]
[ 101 ]
[ 102 ]
[ 103 ]
[ 104 ]
[ 105 ]
Chapter 11: Detecting Advanced Malware
Using Memory Forensics

[ 106 ]
[ 107 ]
[ 108 ]
[ 109 ]
[ 110 ]
[ 111 ]
[ 112 ]
[ 113 ]

You might also like