Skip to Content
Mastering Malware Analysis
book

Mastering Malware Analysis

by Alexey Kleymenov, Amr Thabet
June 2019
Beginner
562 pages
11h 36m
English
Packt Publishing
Content preview from Mastering Malware Analysis
Inspecting Process Injection and API Hooking

In this chapter, we are going to explore more advanced techniques that are used by malware authors for various reasons, including bypassing firewalls, tricking reverse engineers, monitoring and collecting user information in order to steal credit card data and for other purposes.

We will be diving into various process injection techniques, including DLL injection and process hollowing (an advanced technique that was introduced by Stuxnet) and explain how to deal with them. Later, we will look at API hooking, IAT hooking, and other hooking techniques that are used by malware authors and how to handle them.

By the end of this chapter, you will have extended your knowledge of the Windows platform ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Malware Analysis - Second Edition

Mastering Malware Analysis - Second Edition

Alexey Kleymenov, Amr Thabet
Advanced Malware Analysis

Advanced Malware Analysis

Christopher Elisan

Publisher Resources

ISBN: 9781789610789Supplemental Content