Chapter 11. Malware Analysis

Until now, our discussions in this book have covered individual malware types and their associated defenses on a one-by-one basis. For example, we discussed worms, followed by how you squash them. We addressed RootKits, and then looked at techniques for dealing with them. This one-by-one malware approach allowed us to focus on individual attacks and defenses. Using what we've covered so far, you can make sure your defenses stack up against these individual threats.

In this chapter, though, we'll take a different approach to discussing malware. Instead of looking at individual types of malicious code and their defenses, we'll look at how you can analyze malware specimens on your own. With that objective in mind, this ...

Get Malware: Fighting Malicious Code now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.