Windows APT Warfare
Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks. It starts with a tutorial on compiling code and goes on to explain the process of Windows systems and how attackers can exploit it to evade security measures, ensuring that you can stay safe from ATP malware.
Offered by
Difficulty Level
Intermediate
Completion Time
8h36m
Language
English
About Book
Who Is This Book For?
This book is for cybersecurity professionals- especially for anyone working on Windows security, or malware researchers, network administrators, ethical hackers looking to explore Windows exploit, kernel practice, and reverse engineering. A basic understanding of reverse engineering and C/C++ will be helpful.
Windows APT Warfare
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 8h36m total length
From Source to Binaries – The Journey of a C Program
Process Memory – File Mapping, PE Parser, tinyLinker, and Hollowing
Dynamic API Calling – Thread, Process, and Environment Information
Shellcode Technique – Exported Function Parsing
Application Loader Design
PE Module Relocation
PE to Shellcode – Transforming PE Files into Shellcode
Software Packer Design
Digital Signature – Authenticode Verification
Reversing User Account Control and Bypassing Tricks
Appendix – NTFS, Paths, and Symbols
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!