Part 2 Diving Deep into Windows Malware
With Windows remaining the most prevalent operating system for the PC, it is no surprise that the vast majority of existing malware families are focused on this platform. Moreover, the amount of attention and the high number of high-profile actors has led to Windows malware featuring multiple diverse and sophisticated techniques not common to other systems. Here, we will cover them in great detail and teach you how to analyze them using multiple real-world examples.
In this section are the following chapters:
- Chapter 3, Basic Static and Dynamic Analysis for x86/x64
- Chapter 4, Unpacking, Decryption, and Deobfuscation
- Chapter 5, Inspecting Process Injection and API Hooking
- Chapter 6, Bypassing Anti-Reverse Engineering Techniques
- Chapter 7, Understanding Kernel-Mode Rootkits