Chapter 20. Collecting Malware and Initial Analysis
Malware
Types of malware
Malware defensive techniques
Latest trends in honeynet technology
Honeypots
Honeynets
Types of honeypots and honeynets
Thwarting VMware detection
Catching malware
VMware host and guest setup
Using Nepenthes to catch a fly
Initial analysis of malware
Static and live analysis
Norman Sandbox technology
Now that you have some basics skills in exploiting and reverse engineering, it is time to put them together and learn about malware. As an ethical hacker, you will surely find yourself from time to time looking at a piece of malware, and you may need to make some sort of determination about the risk it poses and the action to take to remove it. The next chapter gives you a taste of this ...
Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.