Book of the Month : Malware Forensics

Written by forensic experts from the field, this book is the finest of all in exploring the art of Malware investigation in clear and concise manner. It offers in depth coverage of tools and technique used in live as well as static Malware analysis.





Here is the table of contents of this book

Chapter 1 Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System
Chapter 2 Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System
Chapter 3 Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts
Chapter 4 Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems
Chapter 5 Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems
Chapter 6 Legal Considerations
Chapter 7 File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System
Chapter 8 File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System
Chapter 9 Analysis of a Suspect Program: Windows
Chapter 10 Analysis of a Suspect Program: Linux

This book does extensive and accurate technical coverage of malware investigation on both Windows as well as Linux platform.  It starts with investigation of malware infected system to gather all evidences and then explains about analyzing them in detail to get to the root of malware. It also throws light on discovering the Malware traces through live process memory and physical file analysis to gather all possible information about Malware actions.

The book’s companion website www.malwareforensics.com is a great resource as it offers latest news from the malware forensics field including updates about new Windows/Linux tools related to malware investigation. You can download the sample chapter here. This link also contains the promotional code which will get you 20% discount on purchase of this book.

Though the book is over priced,  it is well worth the money for those who are serious about taking their career into top of Malware investigation.

.

Similar posts
  • SecurityXploded Mentorship Programme ... I am writing this blog to share my SecurityXploded Student Mentorship Programme experience with the future students of this programme. My mentorship programme started last year in August when I was in 2nd year of MS at IIIT-Allahabad. I knew about SecurityXploded community since I used to follow their blogs, training programmes and security tools [...]
  • Code Injection and API Hooking Techni... Hooking covers a range of techniques used for many purposes like debugging, monitoring, intercepting messages, extending functionality etc. Hooking is also used by a lot of rootkits to camouflage themselves on the system. Rootkits use various hooking techniques when they have to hide a process, hide a network port, redirect file writes to some different [...]
  • Announcement – SecurityXploded ... From the past two years we are working actively on couple of projects to support the security community. As you all may already know that we have successfully completed our reversing and malware analysis training programme and we are very glad that it was very helpful for everyone. In my opinion the success of any [...]
  • Advanced Malware Analysis Training Se... Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 2) Dissecting the HeartBeat  RAT Functionalities   This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session, I explained “Decrypting various Communications Of HeartBeat [...]
  • Advanced Malware Analysis Training Se...   Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 1) Reversing & Decrypting Communications of HeartBeat RAT This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session, I explained “Decrypting The [...]

Leave a Reply

Our Company

Follow us on Facebook


Join Mailing List

Get direct access to our expert trainers or mingle with like minded security folks in our mailing list