Chapter 20. Collecting Malware and Initial Analysis

  • Malware

    • Types of malware

    • Malware defensive techniques

  • Latest trends in honeynet technology

    • Honeypots

    • Honeynets

    • Types of honeypots and honeynets

    • Thwarting VMware detection

  • Catching malware

    • VMware host and guest setup

    • Using Nepenthes to catch a fly

  • Initial analysis of malware

    • Static and live analysis

    • Norman Sandbox technology

Now that you have some basics skills in exploiting and reverse engineering, it is time to put them together and learn about malware. As an ethical hacker, you will surely find yourself from time to time looking at a piece of malware, and you may need to make some sort of determination about the risk it poses and the action to take to remove it. The next chapter gives you a taste of this ...

Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.