You have seen the myriad ways in which we can work with assembly language programming and disassembly analysis in the Windows environment by using VC++ IDE. Understanding the tool chain and the operation modes, as well as proper configuration is paramount to facilitating a proper programming process. You have seen how each line in the disassembled code of a compiled binary can be deconstructed and a sample of how both high-level logic and opcode-level analysis can be investigated. You will be doing more assembly programming and analysis as we progress with the material. With a sound introduction to the fundamentals, you can now explore disassembly for malware in the next chapter for a static analysis, which has a tendency to be quite convoluted.
Windows Malware Analysis Essentials
By :
Windows Malware Analysis Essentials
By:
Overview of this book
Table of Contents (13 chapters)
Windows Malware Analysis Essentials
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface
Free Chapter
Down the Rabbit Hole
Dancing with the Dead
Performing a Séance Session
Traversing Across Parallel Dimensions
Good versus Evil – Ogre Wars
Index
Customer Reviews