Windows APT Warfare
Windows APT Warfare
Identify and prevent Windows APT attacks effectively
Ma, Sheng-Hao; Chang, Ziv; Maggi, Federico
Packt Publishing Limited
03/2023
258
Mole
Inglês
9781804618110
15 a 20 dias
Descrição não disponível.
Table of Contents
From Source to Binaries - The Journey of a C Program
Process Memory - File Mapping, PE Parser, tinyLinker, and Hollowing
Dynamic API Calling - Thread, Process, and Environment Information
Shellcode Technique - Exported Function Parsing
Application Loader Design
PE Module Relocation
PE to Shellcode - Transforming PE Files into Shellcode
Software Packer Design
Digital Signature - Authenticode Verification
Reversing User Account Control and Bypassing Tricks
Appendix - NTFS, Paths, and Symbols
From Source to Binaries - The Journey of a C Program
Process Memory - File Mapping, PE Parser, tinyLinker, and Hollowing
Dynamic API Calling - Thread, Process, and Environment Information
Shellcode Technique - Exported Function Parsing
Application Loader Design
PE Module Relocation
PE to Shellcode - Transforming PE Files into Shellcode
Software Packer Design
Digital Signature - Authenticode Verification
Reversing User Account Control and Bypassing Tricks
Appendix - NTFS, Paths, and Symbols
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Windows; APT; Advanced Persistent Threat; Cyberattack; Red team; Operating systems; Malware; C++ programming; Antivirus Software; Operating system; Malware analysis; Practical malware analysis
Table of Contents
From Source to Binaries - The Journey of a C Program
Process Memory - File Mapping, PE Parser, tinyLinker, and Hollowing
Dynamic API Calling - Thread, Process, and Environment Information
Shellcode Technique - Exported Function Parsing
Application Loader Design
PE Module Relocation
PE to Shellcode - Transforming PE Files into Shellcode
Software Packer Design
Digital Signature - Authenticode Verification
Reversing User Account Control and Bypassing Tricks
Appendix - NTFS, Paths, and Symbols
From Source to Binaries - The Journey of a C Program
Process Memory - File Mapping, PE Parser, tinyLinker, and Hollowing
Dynamic API Calling - Thread, Process, and Environment Information
Shellcode Technique - Exported Function Parsing
Application Loader Design
PE Module Relocation
PE to Shellcode - Transforming PE Files into Shellcode
Software Packer Design
Digital Signature - Authenticode Verification
Reversing User Account Control and Bypassing Tricks
Appendix - NTFS, Paths, and Symbols
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.