Reverse engineering

Book Excerpt: Practical Malware Analysis – The Hands-on Guide to Dissecting Malicious Software

March 10, 2012 by Infosec

Another excellent publisher has offered up a generous sample of a book we’ve been talking about. This is Chapter 12 from Practical Malware Analysis – The Hands-on Guide to Dissecting Malicious Software. As usual, if you like this, go buy the full book and tell them how much you enjoyed it!

Chapter 12: Covert Malware Launching

As computer systems and users have become more sophisticated, malware, too, has evolved. For example, because many users know how to list processes with the Windows Task Manager (where malicious software used to appear), malware authors have developed many techniques to blend their malware into the normal Windows landscape, in an effort to conceal it.
This chapter focuses on some of the methods that malware authors use to avoid detection, called covert launching techniques. Here, you’ll learn how to recognize code constructs and other coding patterns that will help you to identify common ways that malware is covertly launched.

Posted: March 10, 2012
Author
Infosec
View Profile

Infosec believes knowledge is power when fighting cybercrime. As the leading cybersecurity education company, we empower people to be cyber-safe at work and home and help IT and security professionals achieve their career goals. It’s our mission to equip all organizations and individuals with the knowledge, skills and confidence to outsmart cybercrime.

One response to “Book Excerpt: Practical Malware Analysis – The Hands-on Guide to Dissecting Malicious Software”

  1. this and “Malware analyst cookbook”, two bible in malware analysis

Leave a Reply

Your email address will not be published.