O'Reilly logo

Mastering Windows Network Forensics and Investigation, 2nd Edition by Scott Pearson, Ryan Johnson, Steve Bunting, Steven Anson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Malware Analysis Tools and Techniques

We will cover several tools and techniques ranging from basic to intermediate in scope and complexity. Advanced tool analysis using debugging tools and other specialized software is beyond the scope of this book and is for those with advanced programming skills. Let’s start from the beginning and build a toolkit that can be used to analyze the inner workings of malicious code and safely monitor its behavior.

Constructing an Effective Malware Analysis Toolkit

The protocol for building an effective malware analysis toolkit is strict and unforgiving for good reason. Following these simple rules will help ensure that malicious code designed to compromise systems and steal data doesn’t do exactly that to your ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required