Book

Windows APT Warfare

Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks. It starts with a tutorial on compiling code and goes on to explain the process of Windows systems and how attackers can exploit it to evade security measures, ensuring that you can stay safe from ATP malware.

Offered byPackt Logo

Difficulty Level

Intermediate

Completion Time

8h36m

Language

English

About Book

Who Is This Book For?

This book is for cybersecurity professionals- especially for anyone working on Windows security, or malware researchers, network administrators, ethical hackers looking to explore Windows exploit, kernel practice, and reverse engineering. A basic understanding of reverse engineering and C/C++ will be helpful.

Book content

chapters 8h36m total length

From Source to Binaries – The Journey of a C Program

Process Memory – File Mapping, PE Parser, tinyLinker, and Hollowing

Dynamic API Calling – Thread, Process, and Environment Information

Shellcode Technique – Exported Function Parsing

Application Loader Design

PE Module Relocation

PE to Shellcode – Transforming PE Files into Shellcode

Software Packer Design

Digital Signature – Authenticode Verification

Reversing User Account Control and Bypassing Tricks

Appendix – NTFS, Paths, and Symbols

Related Resources

Access Ready-to-Use Books for Free!

Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!

No credit card required