CHAPTER6

Malware Collection

 

Now that you have an idea of the different classes of malware, the different technologies used to deploy malware, the different protective mechanisms malware employs to protect itself, and the different dependencies malware has to execute properly in a target system, you are ready to tackle malware.

The ability to analyze, scrutinize, and examine malware requires the use of computer systems that are set up for the purpose of unraveling the mysteries of malware. These computer systems serve as the malware analyst’s research lab, commonly known as a malware research lab. A malware research lab is a collection of systems fully under the control of malware researchers and analysts. It is not for production nor does it ...

Get Advanced Malware Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.