With Windows remaining the most prevalent operating system for the PC, there is no surprise that the vast majority of existing malware families are focused on this platform. Moreover, a lot of attention and the number of high-profile actors led to Windows malware featuring multiple diverse and sophisticated techniques not common to other systems. Here, we will cover them in great detail and teach you how to analyze them using multiple real-world examples. The following chapters are included in this section:
- Chapter 2, Basic Static and Dynamic Analysis for x86/x64
- Chapter 3, Unpacking, Decryption, and Deobfuscation
- Chapter 4, Inspecting Process Injection and API Hooking
- Chapter 5, Bypassing Anti-Reverse Engineering Techniques
- Chapter 6, Understanding Kernel-Mode Rootkits