Phân Tích Malware Nâng Cao của Christopher Elisan

Trường đại học

McGraw-Hill Education

Người đăng

Ẩn danh

Thể loại

book

2015

545
0
0

Phí lưu trữ

100.000 VNĐ

Mục lục chi tiết

FOREWORD

ACKNOWLEDGMENTS

INTRODUCTION

1. CHAPTER 1: MALWARE ANALYSIS 101

1.1. Malware Analysis and Reverse Engineering

1.2. Types of Malware Analysis

1.3. Purpose of Malware Analysis

1.4. Limitations of Malware Analysis

1.5. The Malware Analysis Process

1.6. The Effective Malware Analyst

1.7. Familiarization with Malware

1.8. Familiarization with Analysis Tools

2. CHAPTER 2: MALWARE TAXONOMY

2.1. Remote-Access Trojan

2.2. Fakeware

3. CHAPTER 3: MALWARE DEPLOYMENT

3.1. Malware Infection Vectors

3.2. Types of Malware Infection Vectors

3.3. Instant Messaging and Chat

3.4. Potential Infection Vectors

4. CHAPTER 4: PROTECTIVE MECHANISMS

4.1. The Two States of Malware

4.2. Static Malware Protective Mechanisms

4.3. Dynamic Malware Protective Mechanisms

5. CHAPTER 5: MALWARE DEPENDENCIES

5.1. User Dependencies

6. CHAPTER 6: MALWARE COLLECTION

6.1. Your Own Backyard

6.2. Scan for Malicious Files

6.3. Look for Active Rootkits

6.4. Inspect Startup Programs

6.5. Inspect Running Processes

6.6. Extract Suspicious Files

6.7. Research Mailing Lists

7. CHAPTER 7: STATIC ANALYSIS LAB

7.1. The Static Analysis Lab

7.2. Host File Inspection Tools

7.3. Mitigate Becoming a Malware Staging Point

7.4. Setting Up the Lab

7.5. Choose the Hardware

7.6. Install the Operating System

7.7. Harden the Lab

7.8. Anonymize the Lab

7.9. Isolate the Lab

7.10. The Virtualized Static Analysis Lab

7.11. Backing Up and Restoring

8. CHAPTER 8: DYNAMIC ANALYSIS LAB

8.1. Setting Up the Lab

8.2. Choose the Hardware

8.3. Install the Operating System

8.4. Make the Lab Malware Friendly

8.5. Anonymize the Lab

8.6. Isolate the Lab

8.7. Restoring to a Clean State

8.8. Virtualized Environment Clean State Restoration

8.9. Bare-Metal Environment Clean State Restoration

8.10. Backing Up and Restoring

8.11. The Golden Image

8.12. Other Systems Supporting the Lab

9. CHAPTER 9: THE PORTABLE EXECUTABLE FILE

9.1. The Windows Portable Executable File

9.2. The PE File Format

9.3. Relative Virtual Address

9.4. PE Import Functions

9.5. PE Export Functions

9.6. 64-Bit PE File Format

10. CHAPTER 10: THE PROPER WAY TO HANDLE FILES

10.1. File’s Analysis Life Cycle

11. CHAPTER 11: INSPECTING STATIC MALWARE

11.1. Static Analysis Techniques

11.2. File Type Identification

11.3. Protective Mechanisms Identification

11.4. PE Structure Verification

12. CHAPTER 12: INSPECTING DYNAMIC MALWARE

12.1. Analyzing Host Behavior

12.2. Analyzing Network Behavior

12.3. Dynamic Analysis Limitations

13. CHAPTER 13: TOOLS OF THE TRADE

13.1. Malware Analysis Use Cases

13.2. Malware Analyst Toolbox

13.3. Tools of the Trade

13.4. Malcode Analyst Pack

13.5. Network Capturing Tools

13.6. Free Online Automated Sandbox Services

APPENDIX A: TOOLS LIST

APPENDIX B: LIST OF LABORATORIES

APPENDIX C: VOLATILITY FRAMEWORK BASIC PLUG-INS