Part 1: Introduction
1. Introduction
2. Malware Analysis Lab Setup
Part 2: OS and System Fundamentals 3. File & File Formats
4. Virtual Memory & Portable Executable(PE) File
5. Windows Internals Part 3: Malware Components & Analysis
6. Malware Components & Distribution
7. Malware Packers 8. Persistence Mechanisms
9. Network Communication
10. Code Injection, Process Hollowing & API Hooking 11. Stealth and Rootkits
Part 3: Malware Analysis & Classification
12. Static Analysis 13. Dynamic Analysis
14. Memory Forensics With Volatility
15. Malware Payload Dissection & Classification Part 4: Malware Reverse Engineering
16. Debuggers & Assembly Language
17. Debugging Tricks for Unpacking Malwares 18. Debugging Code Injection
19. Armoring & Evasion - The Anti Techniques
20. File-less, Macros & Other Malware Trends Part 5: Detection Engineering
21. Dev Analysis Lab Setup
22. Anti-Virus Engines 23. IDS/IPS & Snort/Suricata Rule Writing
24. Malware Sandbox Internals
25. Binary Instrumentation for Reversing Automation
About the Author: Abhijit Mohanta is an independent cybersecurity consultant and corporate trainer who has worked extensively in malware reverse engineering, vulnerability research, anti-virus engine development, anti-malware signature writing, and sandbox development. He has worked with the Symantec, McAfee, and Juniper Networks anti-malware labs. He holds several patents. He blogs regularly and has been a speaker at security conferences and workshops. His articles have been republished and quoted in a number of blogs and whitepapers, including eForensics magazine. He is also the author of the book Preventing Ransomware: Understand, Prevent, and Remediate Ransomware Attacks.
Anoop Saldanha is one of the core authors of the Suricata Intrusion Detection and Prevention System, funded by the US Department of Homeland Security (DHS). He works as an independent security consultant and as a corporate security trainer. He designs and develops various detection technologies to secure both the host and the network, ranging from network security tools such as IDS/IPS to malware sandboxes, malware analysis tools, firewalls, and endpoints. He holds multiple patents in the field of security and speaks at security conferences and workshops. He has previously worked in threat research labs and detection engineering teams at RSA Security, Juniper Networks, Cyphort Cybersecurity, and various other cybersecurity startups.