The Art of Mac Malware, Volume 1

The Art of Mac Malware, Volume 1
Author :
Publisher : No Starch Press
Total Pages : 329
Release :
ISBN-10 : 9781718501959
ISBN-13 : 1718501951
Rating : 4/5 (59 Downloads)

Book Synopsis The Art of Mac Malware, Volume 1 by : Patrick Wardle

Download or read book The Art of Mac Malware, Volume 1 written by Patrick Wardle and published by No Starch Press. This book was released on 2022-06-28 with total page 329 pages. Available in PDF, EPUB and Kindle. Book excerpt: A comprehensive guide to the threats facing Apple computers and the foundational knowledge needed to become a proficient Mac malware analyst. Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what’s inside. Discover the secrets of nation state backdoors, destructive ransomware, and subversive cryptocurrency miners as you uncover their infection methods, persistence strategies, and insidious capabilities. Then work with and extend foundational reverse-engineering tools to extract and decrypt embedded strings, unpack protected Mach-O malware, and even reconstruct binary code. Next, using a debugger, you’ll execute the malware, instruction by instruction, to discover exactly how it operates. In the book’s final section, you’ll put these lessons into practice by analyzing a complex Mac malware specimen on your own. You’ll learn to: • Recognize common infections vectors, persistence mechanisms, and payloads leveraged by Mac malware • Triage unknown samples in order to quickly classify them as benign or malicious • Work with static analysis tools, including disassemblers, in order to study malicious scripts and compiled binaries • Leverage dynamical analysis tools, such as monitoring tools and debuggers, to gain further insight into sophisticated threats • Quickly identify and bypass anti-analysis techniques aimed at thwarting your analysis attempts A former NSA hacker and current leader in the field of macOS threat analysis, Patrick Wardle uses real-world examples pulled from his original research. The Art of Mac Malware: The Guide to Analyzing Malicious Software is the definitive resource to battling these ever more prevalent and insidious Apple-focused threats.


The Art of Mac Malware, Volume 1 Related Books

The Art of Mac Malware, Volume 1
Language: en
Pages: 329
Authors: Patrick Wardle
Categories: Computers
Type: BOOK - Published: 2022-06-28 - Publisher: No Starch Press

DOWNLOAD EBOOK

A comprehensive guide to the threats facing Apple computers and the foundational knowledge needed to become a proficient Mac malware analyst. Defenders must ful
The Art of Mac Malware, Volume 1
Language: en
Pages: 329
Authors: Patrick Wardle
Categories: Computers
Type: BOOK - Published: 2022-07-12 - Publisher: No Starch Press

DOWNLOAD EBOOK

A comprehensive guide to the threats facing Apple computers and the foundational knowledge needed to become a proficient Mac malware analyst. Defenders must ful
The Art of Memory Forensics
Language: en
Pages: 912
Authors: Michael Hale Ligh
Categories: Computers
Type: BOOK - Published: 2014-07-22 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve di
Practical Malware Analysis
Language: en
Pages: 802
Authors: Michael Sikorski
Categories: Computers
Type: BOOK - Published: 2012-02-01 - Publisher: No Starch Press

DOWNLOAD EBOOK

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections
Rootkits and Bootkits
Language: en
Pages: 449
Authors: Alex Matrosov
Categories: Computers
Type: BOOK - Published: 2019-05-07 - Publisher: No Starch Press

DOWNLOAD EBOOK

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. W