Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Dedication About the Authors Acknowledgments Introduction
Who Should Read This Book How This Book Is Organized Setting Up Your Environment Conventions
On The Book’s DVD Chapter 1: Anonymizing Your Activities
The Onion Router (Tor) Malware Research with Tor Tor Pitfalls Proxy Servers and Protocols Web-Based Anonymizers Alternate Ways to Stay Anonymous Cellular Internet Connections Virtual Private Networks Being Unique and Not Getting Busted
Chapter 2: Honeypots
Nepenthes Honeypots Working with Dionaea Honeypots
Chapter 3: Malware Classification
Classification with ClamAV Classification with YARA Putting It All Together
Chapter 4: Sandboxes and Multi-AV Scanners
Public Antivirus Scanners Multi-Antivirus Scanner Comparison Public Sandbox Analysis
Chapter 5: Researching Domains and IP Addresses
Researching Suspicious Domains Researching IP Addresses Researching with Passive DNS and Other Tools Fast Flux Domains Geo-Mapping IP Addresses
Chapter 6: Documents, Shellcode, and URLs
Analyzing JavaScript Analyzing PDF Documents Analyzing Malicious Office Documents Analyzing Network Traffic
Chapter 7: Malware Labs
Networking Physical Targets
Chapter 8: Automation
The Analysis Cycle Automation with Python Adding Analysis Modules Miscellaneous Systems
Chapter 9: Dynamic Analysis
API Monitoring/Hooking Data Preservation
Chapter 10: Malware Forensics
The Sleuth Kit (TSK) Forensic/Incident Response Grab Bag Registry Analysis
Chapter 11: Debugging Malware
Working with Debuggers Immunity Debugger’s Python API WinAppDbg Python Debugger
Chapter 12: De-obfuscation
Decoding Common Algorithms Decryption Unpacking Malware Unpacking Resources Debugger Scripting
Chapter 13: Working with DLLs Chapter 14: Kernel Debugging
Remote Kernel Debugging Local Kernel Debugging Software Requirements
Chapter 15: Memory Forensics with Volatility
Memory Acquisition Preparing a Volatility Install
Chapter 16: Memory Forensics: Code Injection and Extraction
Investigating DLLs Code Injection and the VAD Reconstructing Binaries
Chapter 17: Memory Forensics: Rootkits Chapter 18: Memory Forensics: Network and Registry
Registry Analysis
Index Wiley Publishing, Inc. End-User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion