Learning Malware Analysis
Learning Malware Analysis
[2]
[3]
[4]
[5]
Chapter 2: Static Analysis
[6]
[7]
[8]
[9]
[ 10 ]
[ 11 ]
[ 12 ]
Chapter 3: Dynamic Analysis
[ 13 ]
[ 14 ]
[ 15 ]
[ 16 ]
[ 17 ]
[ 18 ]
[ 19 ]
[ 20 ]
Chapter 4: Assembly Language and
Disassembly Primer
[ 21 ]
[ 22 ]
[ 23 ]
[ 24 ]
[ 25 ]
[ 26 ]
[ 27 ]
[ 28 ]
[ 29 ]
[ 30 ]
[ 31 ]
Chapter 5: Disassembly Using IDA
[ 32 ]
[ 33 ]
[ 34 ]
[ 35 ]
[ 36 ]
[ 37 ]
[ 38 ]
[ 39 ]
[ 40 ]
Chapter 6: Debugging Malicious Binaries
[ 41 ]
[ 42 ]
[ 43 ]
[ 44 ]
[ 45 ]
[ 46 ]
[ 47 ]
[ 48 ]
[ 49 ]
[ 50 ]
[ 51 ]
[ 52 ]
Chapter 7: Malware Functionalities and
Persistence
[ 53 ]
[ 54 ]
[ 55 ]
[ 56 ]
[ 57 ]
[ 58 ]
[ 59 ]
[ 60 ]
[ 61 ]
[ 62 ]
Chapter 8: Code Injection and Hooking
[ 63 ]
[ 64 ]
[ 65 ]
[ 66 ]
[ 67 ]
[ 68 ]
[ 69 ]
[ 70 ]
[ 71 ]
[ 72 ]
[ 73 ]
[ 74 ]
[ 75 ]
[ 76 ]
[ 77 ]
[ 78 ]
[ 79 ]
Chapter 9: Malware Obfuscation Techniques
[ 80 ]
[ 81 ]
[ 82 ]
[ 83 ]
[ 84 ]
[ 85 ]
[ 86 ]
[ 87 ]
[ 88 ]
[ 89 ]
[ 90 ]
[ 91 ]
[ 92 ]
[ 93 ]
[ 94 ]
[ 95 ]
[ 96 ]
[ 97 ]
[ 98 ]
Chapter 10: Hunting Malware Using Memory
Forensics
[ 99 ]
[ 100 ]
[ 101 ]
[ 102 ]
[ 103 ]
[ 104 ]
[ 105 ]
Chapter 11: Detecting Advanced Malware
Using Memory Forensics
[ 106 ]
[ 107 ]
[ 108 ]
[ 109 ]
[ 110 ]
[ 111 ]
[ 112 ]
[ 113 ]