- Tapa blanda: 744 páginas
- Editor: John Wiley & Sons Ltd; Edición: 1 (27 de octubre de 2010)
- Idioma: Inglés
- ISBN-10: 0470613033
- ISBN-13: 978-0470613030
- Valoración media de los clientes: Sé el primero en opinar sobre este producto
- Clasificación en los más vendidos de Amazon: nº67.961 en Libros en idiomas extranjeros (Ver el Top 100 en Libros en idiomas extranjeros)
- Ver el Índice completo
Compara Precios en Amazon
+ EUR 3,15 de gastos de envío
+ Envío GRATIS
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (Inglés) Tapa blanda – 27 oct 2010
|Nuevo desde||Usado desde|
Comprados juntos habitualmente
Los clientes que compraron este producto también compraron
Descripción del producto
Reseña del editor
A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
Powerful, step-by-step solutions to dozens of common threats
We called this a cookbook because each "recipe" presents both the ingredients and the steps you take to resolve a specific problem or research a given threat. On the DVD, you'll find supporting files and original programs that provide additional resources. You'll learn how to analyze malware using tools written by the authors as well as hundreds of other publicly available tools. If your job involves incident response, computer forensics, systems security, or antivirus research, this book will become invaluable to you.
Learn to conduct online investigations without revealing your identity
Use honeypots to collect malware being distributed by bots and worms
Build a low-budget malware lab with virtualization or bare bones hardware
Reverse engineer common encoding and encryption algorithms
Set up an advanced memory forensics platform for malware analysis
Investigate prevalent threats such as Zeus, Silent Banker, CoreFlood, Conficker, Virut, Clampi, Bankpatch, BlackEnergy, and many more!
On the DVD
Use the files on the DVD to follow along with the recipes or to conduct your own investigations and analyses. You will find:
Windows and Linux tools
Over 50 original programs in Python, C/C++, and Perl
"The most useful technical security book I've read this year. A must-have for all who protect systems from malicious software."
Lenny Zeltser, Security Practice Director at Savvis and Senior Faculty Member at SANS Institute
"The ultimate guide for anyone interested in malware analysis."
Ryan Olson, Director, VeriSign iDefense Rapid Response Team
"Every page is filled with practical malware knowledge, innovative ideas, and useful tools. Worth its weight in gold!"
AAron Walters, Lead Developer of Volatility and VP of Security R&D at Terremark
No es necesario ningún dispositivo Kindle. Descárgate una de las apps de Kindle gratuitas para comenzar a leer libros Kindle en tu smartphone, tablet u ordenador.
Obtén la app gratuita:
Detalles del producto
Si eres el vendedor de este producto, ¿te gustaría sugerir ciertos cambios a través del servicio de atención al vendedor?
¿Qué otros productos compran los clientes tras ver este producto?
Opiniones de clientes
|5 estrellas (0%)|
|4 estrellas (0%)|
|3 estrellas (0%)|
|2 estrellas (0%)|
|1 estrella (0%)|
Opiniones de clientes más útiles en Amazon.com
I understand that the concepts are key in the long run, and mentioning specific programs can lead to an outdated book faster, but considering this book just came out, the programs are indeed current and work great. The book goes through a good number of programs freely available on the web or included on dvd, and it describes them and how to use them / configure them as well, rather than simply presenting a list of programs.
The book is detailed and in-depth enough to provide good analysis of malware as well. It does assume some prior knowledge of programming, general security concepts, and different OS's, but it provides clear descriptions of malware analysis tools that are easy to follow.
Overall, it's a good book to pick up and work your way through, rather than read your way through. This is simply the way it's structured. As you read each chapter you feel the need to actually sit in front of a computer and FOLLOW the recipes to learn the material - something that can often be difficult to do with other textbooks. So far, my favorite book on the subject!
I am amazed that this book was written by four people because it is written in a consistent and engaging style throughout. There is so much information!! In any other book this would inevitably be boring. But in this book the wealth of techniques, examples and code snippets is a marvelous buffet of mind tickling delicacies. I feel incredibly lucky to have come across it. It has inspired me to write my own honeypot and my own web vulnerability scanner. I have cataloged all the dodgy attachments sent to me and analyzed them with multiscanners and sandboxes. I no longer have to rely on the accuracy of vendors to scan my system: I can find rootkits myself using sysinternals and other tools introduced by this book.
This book has enhanced my computer skills and knowledge across the board. I highly recommend it for intermediate-advanced programmers. It does assume a good knowledge of programming and some comfort with python, c/c++, assembler, and other common programming tools. But everything is explained in English as well, so deep familiarity with any specific language or tool is not required. Buy it and enjoy!!
One suggestion for those looking to purchase this book, it would help you to gain a mild understanding of python as many of the very great tools contained within the book rely on python. It is by no means necessary to understand python to use the tools but it would be helpful to better understand what the tools are doing.
I found the 4 chapters on memory analysis to be completely awesome! I have not seen such a wealth of information on memory analysis in once place. The chapters on memory analysis go from the basic analysis of memory dump to exploring code injection and rootkits to pulling registry and network artifacts from memory.
The book does a great job of introducing the reader to multiple ways in dealing with malware from using tools for classification, scanning with AV engines and sandboxes to working with DLLs and malware debugging. I really liked how when a tool is introduced then authors then usually have a script to automate much of the process. The DVD that comes with the book is worth the price of the book just by itself.
If you work with malware in any capacity I think this book with benefit you as it has so much to offer in so many areas when it comes to fighting malicious code.