Jump to ratings and reviews
Rate this book

Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Rate this book

Master malware analysis to protect your systems from getting infected

Key Features Set up and model solutions, investigate malware, and prevent it from occurring in future Learn core concepts of dynamic malware analysis, memory forensics, decryption, and much more A practical guide to developing innovative solutions to numerous malware incidents Book Description

With the ever-growing proliferation of technology, the risk of encountering malicious code or malware has also increased. Malware analysis has become one of the most trending topics in businesses in recent years due to multiple prominent ransomware attacks. Mastering Malware Analysis explains the universal patterns behind different malicious software types and how to analyze them using a variety of approaches. You will learn how to examine malware code and determine the damage it can possibly cause to your systems to ensure that it won't propagate any further. Moving forward, you will cover all aspects of malware analysis for the Windows platform in detail. Next, you will get to grips with obfuscation and anti-disassembly, anti-debugging, as well as anti-virtual machine techniques. This book will help you deal with modern cross-platform malware. Throughout the course of this book, you will explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection. Finally, this book will help you strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms. By the end of this book, you will have learned to effectively analyze, investigate, and build innovative solutions to handle any malware incidents.

What you will learn Explore widely used assembly languages to strengthen your reverse-engineering skills Master different executable file formats, programming languages, and relevant APIs used by attackers Perform static and dynamic analysis for multiple platforms and file types Get to grips with handling sophisticated malware cases Understand real advanced attacks, covering all stages from infiltration to hacking the system Learn to bypass anti-reverse engineering techniques Who this book is for

If you are an IT security administrator, forensic analyst, or malware researcher looking to secure against malicious software or investigate malicious code, this book is for you. Prior programming experience and a fair understanding of malware attacks and investigation is expected.

Table of Contents A Crash Course in CISC & RISC Assembly and Basics of Computer Programming Basic Static and Dynamic Analysis for x86/x64 Unpacking, Decryption and Deobfuscation Inspecting Process Injection & API Hooking Bypassing Anti-Reverse Engineering Techniques Understanding Kernel-Mode & Rootkits Handling Exploits & Shellcode Reversing Bytecode Languages: DotNet, Java and More Scripts & Macros: Reversing, Deobfuscation and Debugging Dissecting Linux and IoT Malware Intro to MacOS and iOS Threats Analyzing Android Malware Samples

564 pages, Kindle Edition

Published June 6, 2019

14 people are currently reading
71 people want to read

About the author

Alexey Kleymenov

2 books2 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
14 (56%)
4 stars
7 (28%)
3 stars
2 (8%)
2 stars
1 (4%)
1 star
1 (4%)
Displaying 1 - 11 of 11 reviews
Profile Image for Ganesh Shukla.
1 review
March 30, 2021
Those who looking for Malware Analyst career or familiar with this term, this book is great for you. This book contain everything what actually org or company looking for. Each topic & section explained with example & real world secnerio. This book take you from basic to Advanced level. I liked most favourite part in this book is Amr sir smoothly covered the process and Injection level techniques, loved it. You can also find how Modern level attack happen in this book i.e Android Application &iOS. You get to learn each techniques and tools in depth which is not normally elobrate in any book. I highly recommend you must read this book at once.

Some say, "To catch a theif, you act like a theif" this book fullfil that proverb.
1 review
March 26, 2021
every time I try to study malware analysis I always stuck at some point because I didn't have any kind of mentorship until I read the Mastering Malware Analysis book. it was my guide. It's very informative and helped me to organize my studying methodology and know what skills do I need to improve, most importantly, this book works like a bible or a big cheat sheet. whenever I'm stuck while analyzing any sample, I always refer to the book. and it really helped me to improve my skills and my career. I strongly recommend reading this book. the more you read the more you'll discover new tips and tricks.
1 review
March 31, 2021
I highly recommend this book and really admire the way of its presentation and teaching style. this book. It describes many malware analysis techniques in various operating systems, mitigation techniques, API Hooking technologies, shellcode review and Office exploits !! it also covers the mobile phone OS analysis from a malware analyzer view including Android and iOS! Also it would inform you about some of the most dangerous CVE’s for gaining root access, both in windows and Linux, which I am sure that it can’t be found on any other books easily, I strongly suggest you to read it, because it is a very detailed book
10 reviews1 follower
October 3, 2023
Best current book on the subject. Great coverage of theory as well as breadth, which is very hard with the malware ecosystem nowadays. Currently reading the second edition and would love to see more on Rust and Go binary triage in the next.
Profile Image for Ashraf Ashour.
1 review
March 26, 2021
It's an Excellent book for both beginners and advanced level in malware analysis and Cybersecurity in general. Thanks to Eng Amr Thabet and Alexey Kleymenow .
1 review
March 31, 2021
I Just read about three chapter and it was really amazing book
I recommend it for every one who interested in malware analysis Eng Amr Thabet but years of experiance in this book
This entire review has been hidden because of spoilers.
1 review
April 3, 2021
Great collection and pathway to understand and get pro skills by timely manner about deep and important facts in a area of cyber security .. It require a good fundamental about IT (OS's .. protocols .. networking, linux .. some scripting ) armed with those, this book will certainly help to not stuck onto 'evrry stone's on pathway to cyber security ..but give you fundament and skills which can put you apart from.just regular 'certified'
1 review
January 13, 2020
I find this book incredibly helpful in my day to day work. The book covers a lot of ground which I feel is fair; going too in-depth into a topic is a task better suited to the reader. The overviews of each section are straight and to-the-point, which I appreciate. Linux, IoT, Android and mac threats are also covered, alongside more modern threats such as scripting and macros. Furthermore, bytecode languages are covered, shellcode exploits discussed and this book also dares to cover other instruction sets (not just x86!) which is to be commended. All of this content features alongside "malware analysis book" staples such as IDA, Portable Executable file format and reverse engineering. What more could you want?

Definitely worth the money.
Profile Image for Carter.
597 reviews
December 14, 2019
I find Packt publishing books to be really hit and miss. There are some good titles but generally for a lot of them including this one the editing is quite poor. It is difficult to assess this from the table of contents since that portion of the book makes it seem reasonable but when you get to the actual content some pages only have one sentence on them describing some topic. The only section of the book I found interesting was the anti-debugging techniques section but since the title is sometimes almost in note form the descriptions of what is actually going on is somewhat wanting.
Profile Image for Sh Bibi.
1 review
January 15, 2020
The book is very good for beginners such as I. It's helpful and it helpfully summarises topics for you.
Displaying 1 - 11 of 11 reviews

Can't find what you're looking for?

Get help and learn more about the design.