Unlimited WordPress themes, plugins & video downloads!

Research

Research – Malware Analysis Part I

Malware Analysis Part I – This guide is the first part of a series of three where we begin with setting up the very foundation of a analysis environment; the analysis station. It will give the reader a quick recap in the different phases of malware analysis along with a few examples. It will then guide the reader in how to build an analysis station optimized for these phases. Along with this, the guide also introduces a workflow that will give the reader a good kick-start in performing malware analysis on a professional basis, not only on a technical level.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/125522/0x90.se_-_Malware_Analysis_-_Part_I.pdf

Source: https://packetstormsecurity.com/files/125522/Malware-Analysis-Part-I.html

Related posts
Research

Research - Transferable State Attack On Iterated Hashing Functions

Research

Research - Troopers 2013 Call For Papers

Research

Research - Ubuntu OverlayFS Local Privilege Escalation

Research

Research - Understanding SQL Injection

Sign up for our Newsletter and
stay informed