没有合适的资源?快使用搜索试试~ 我知道了~
Accelerated Windows Malware Analysis with Memory Dumps(2nd) 无水印p...
需积分: 12 39 下载量 53 浏览量
2017-10-13
12:28:07
上传
评论
收藏 9.52MB PDF 举报
温馨提示
Accelerated Windows Malware Analysis with Memory Dumps(2nd) 英文无水印pdf 第2版 pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
资源推荐
资源详情
资源评论
2
Published by OpenTask, Republic of Ireland
Copyright © 2017 by OpenTask
Copyright © 2017 by Software Diagnostics Services
Copyright © 2017 by Dmitry Vostokov
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, without the prior written permission of the
publisher.
You must not circulate this book in any other binding or cover, and you must impose the same
condition on any acquirer.
Product and company names mentioned in this book may be trademarks of their owners.
OpenTask books and magazines are available through booksellers and distributors worldwide.
For further information or comments send requests to press@opentask.com.
A CIP catalog record for this book is available from the British Library.
ISBN-l3: 978-1-908043-86-3 (Paperback)
Revision 2.01 (October 2017)
3
Contents
About the Author .............................................................................................................................................................. 5
Introduction ...................................................................................................................................................................... 7
Practice Exercises ........................................................................................................................................................... 17
Exercise 0: Download, setup and verify your WinDbg installation ............................................................................ 22
Exercise M1A .............................................................................................................................................................. 35
Exercise M1B .............................................................................................................................................................. 48
Exercise M2 ................................................................................................................................................................. 60
Exercise M3 ................................................................................................................................................................. 77
Exercise M4 ............................................................................................................................................................... 130
Exercise M5 ............................................................................................................................................................... 186
Exercise M6 ............................................................................................................................................................... 210
Selected Q&A ................................................................................................................................................................ 232
Appendix ....................................................................................................................................................................... 235
Malware Analysis Patterns ....................................................................................................................................... 237
Deviant Module .................................................................................................................................................... 237
Deviant Token ....................................................................................................................................................... 244
Driver Device Collection ....................................................................................................................................... 245
Execution Residue ................................................................................................................................................ 246
Fake Module ......................................................................................................................................................... 270
Hidden Module ..................................................................................................................................................... 274
Hidden Process ..................................................................................................................................................... 276
Hooksware ............................................................................................................................................................ 278
Namespace ........................................................................................................................................................... 279
No Component Symbols ....................................................................................................................................... 280
Out-of-Module Pointer ......................................................................................................................................... 283
Packed Code ......................................................................................................................................................... 284
Patched Code ........................................................................................................................................................ 287
Pre-Obfuscation Residue ...................................................................................................................................... 288
Raw Pointer .......................................................................................................................................................... 289
RIP Stack Trace ..................................................................................................................................................... 290
Self-Diagnosis (Kernel Mode) ............................................................................................................................... 292
Stack Trace Collection .......................................................................................................................................... 293
Stack Trace Collection (I/O Requests) .................................................................................................................. 301
4
String Hint ............................................................................................................................................................. 305
Unknown Module ................................................................................................................................................. 307
Raw Stack Dump of All Threads (Kernel Space) ........................................................................................................ 310
Complete Stack Traces from x64 System ................................................................................................................. 311
5
About the Author
剩余311页未读,继续阅读
资源评论
yinkaisheng-nj
- 粉丝: 762
- 资源: 6231
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 提取文字_20241116.docx
- 使用 PyTorch /TensorFlow实现 ZFNet 进行 MNIST 图像分类
- Python课程设计之俄罗斯方块
- C#仓库条码管理系统源码数据库 SQL2008源码类型 WinForm
- 网安面试题合集-来自网络收集.zip
- (2024最新整理)42万+世界各国新冠疫情数据(2020.1-2024.8)
- ESP32开发板(CH340驱动芯片) Type-C口+数据线+0.96显示屏+杜邦线 链接wifi,显示当前时间
- windows hex查看工具
- C语言编程基础及其应用详解:从入门到实战练习.pdf
- C#CS小型医院HIS门诊挂号收费管理系统源码数据库 SQL2008源码类型 WinForm
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功