Part 2 – Windows Process Internals
In this section, you will learn techniques such as static DLL export function analysis, dynamic PE climbing, writing shellcode in Python, manual analysis of the Import Address Table (IAT), replacing API behavior with malicious behavior, and complete loader design.
This section has the following chapters:
- Chapter 4, Shellcode Technique – Exported Function Parsing
- Chapter 5, Application Loader Design
- Chapter 6, PE Module Relocation