Digital List Price: | $43.99 |
Kindle Price: | $31.72 Save $12.27 (28%) |
Sold by: | Amazon.com Services LLC |
Your Memberships & Subscriptions

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Windows Malware Analysis Essentials Kindle Edition
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
About This Book
- Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware
- Understand how to decipher x86 assembly code from source code inside your favourite development environment
- A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process
Who This Book Is For
This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around.
What You Will Learn
- Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes
- Get introduced to static and dynamic analysis methodologies and build your own malware lab
- Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief
- Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program
- Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario
- Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode
In Detail
Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation.
We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals.
By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process.
Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware.
Style and approach
An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.
- LanguageEnglish
- PublisherPackt Publishing
- Publication dateSeptember 1, 2015
- File size49294 KB
Customers who bought this item also bought
Editorial Reviews
Review
Product details
- ASIN : B014HFNB36
- Publisher : Packt Publishing; 1st edition (September 1, 2015)
- Publication date : September 1, 2015
- Language : English
- File size : 49294 KB
- Text-to-Speech : Enabled
- Screen Reader : Supported
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Sticky notes : On Kindle Scribe
- Print length : 332 pages
- Page numbers source ISBN : 1785281518
- Best Sellers Rank: #2,608,304 in Kindle Store (See Top 100 in Kindle Store)
- #203 in Windows Servers
- #298 in Computer Simulation (Kindle Store)
- #457 in Viruses & Malware
- Customer Reviews:
About the author

Victor Marak is a security researcher, an electronic musician, and a world backpacker. He is a college dropout and an autodidact, and he loves working on interesting subjects such as tracker based music production, DSP electronics, and psychology. He has worked for start-ups, mid-tier, and fortune 500 companies with since 2010 with over 8 years of experience in anti-virus technologies and malware research. He was into music production prior to joining the anti-malware industry, and his solo projects are on the world's largest electronic dance music market― Beatport, as well as other major retailers like iTunes, Amazon and Traxxsource. He is in perpetual backpacking mode, set to globe-trotting, especially to his favorite countries in Europe and Central Asia. He can be found hanging around on LinkedIn and Quora and a host of alternative and underground forums.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The technical subject is quite high level but thanks to a wonderful and precise introduction about the basics of reverse engineering and disassembling, you can attain your goals of understanding malicious codes.
I recommend tremendously !
Top reviews from other countries
