Beyond the fundamentals of computing including number systems and Boolean operators, most computer programs make use of constructs that enable us to convey logic in source code and build algorithms that work with and on data structures. This section explains the most essential language constructs in C that should set the tone for how the rest of the book progresses. When analyzing malware, much of your time will be spent in front of the disassembler and debugger, and reading as well as writing assembly code will be a routine activity. The commonly used code constructs for native binary-compiled languages once written to source code are digested by the compiler and linker to produce the final binary executable. To what end the code constructs are compiled is a natural point of interest for the analyst. Since most of the time, the source code of the malware binary is not available, it is mandatory that recognizing code constructs in assembly be practiced...
Windows Malware Analysis Essentials
By :
Windows Malware Analysis Essentials
By:
Overview of this book
Table of Contents (13 chapters)
Windows Malware Analysis Essentials
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface
Free Chapter
Down the Rabbit Hole
Dancing with the Dead
Performing a Séance Session
Traversing Across Parallel Dimensions
Good versus Evil – Ogre Wars
Index
Customer Reviews