Malware Analysis Techniques
Comprehensive threat analysis is important for incident responders as it helps them to ensure that a threat has been entirely eliminated. This book shows you how to quickly triage, identify, attribute, and remediate threats with proper analysis techniques, and guides you in implementing your knowledge to prevent further incidents.
Offered by
Difficulty Level
Intermediate
Completion Time
9h24m
Language
English
About Book
Who Is This Book For?
This book is for incident response professionals, malware analysts, and researchers who want to sharpen their skillset or are looking for a reference for common static and dynamic analysis techniques. Beginners will also find this book useful to get started with learning about malware analysis. Basic knowledge of command-line interfaces, familiarity with Windows and Unix-like filesystems and registries, and experience in scripting languages such as PowerShell, Python, or Ruby will assist with understanding the concepts covered.
Malware Analysis Techniques
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 9h24m total length
Creating and Maintaining Your Detonation Environment
Static Analysis – Techniques and Tooling
Dynamic Analysis – Techniques and Tooling
A Word on Automated Sandboxing
Advanced Static Analysis – Out of the White Noise
Advanced Dynamic Analysis – Looking at Explosions
Advanced Dynamic Analysis Part 2 – Refusing to Take the Blue Pill
De-Obfuscating Malicious Scripts – Putting the Toothpaste Back in the Tube
The Reverse Card – Weaponization of IOCs and OSINT for Defense
Malicious Functionality – Mapping your sample’s behavior against MITRE ATT&CK
Challenge Solutions
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!