practical_malware_analysis.pdf

(9494 KB) Pobierz
PRAISE FOR
PRACTICAL MALWARE ANALYSIS
Digital Forensics Book of the Year,
F
ORENSIC
4
CAST
A
WARDS
2013
“A hands-on introduction to malware analysis. I’d recommend it to anyone
who wants to dissect Windows malware.”
—Ilfak
Guilfanov,
C
REATOR OF
IDA P
RO
“The book every malware analyst should keep handy.”
—Richard
Bejtlich,
CSO
OF
M
ANDIANT
& F
OUNDER OF
T
AO
S
ECURITY
“This book does exactly what it promises on the cover; it’s crammed with
detail and has an intensely practical approach, but it’s well organised enough
that you can keep it around as handy reference.”
—Mary
Branscombe,
ZDN
ET
“If you’re starting out in malware analysis, or if you are are coming to analysis
from another discipline, I’d recommend having a nose.”
—Paul
Baccas,
N
AKED
S
ECURITY FROM
S
OPHOS
“An excellent crash course in malware analysis.”
—Dino
Dai Zovi,
I
NDEPENDENT
S
ECURITY
C
ONSULTANT
“The most comprehensive guide to analysis of malware, offering detailed
coverage of all the essential skills required to understand the specific
challenges presented by modern malware.”
—Chris
Eagle,
S
ENIOR
L
ECTURER OF
C
OMPUTER
S
CIENCE AT THE
N
AVAL
P
OSTGRADUATE
S
CHOOL
“A great introduction to malware analysis. All chapters contain detailed
technical explanations and hands-on lab exercises to get you immediate
exposure to real malware.”
—Sebastian
Porst,
G
OOGLE
S
OFTWARE
E
NGINEER
“Brings reverse-engineering to readers of all skill levels. Technically rich and
accessible, the labs will lead you to a deeper understanding of the art and
science of reverse-engineering. I strongly believe this will become the defacto
text for learning malware analysis in the future.”
—Danny
Quist,
P
H
D, F
OUNDER OF
O
FFENSIVE
C
OMPUTING
“An awesome book . . . written by knowledgeable authors who possess
the rare gift of being able to communicate their knowledge through the
written word.”
—Richard
Austin,
IEEE C
IPHER
“If you only read one malware book or are looking to break into the world of
malware analysis, this is the book to get.”
—Patrick
Engebretson,
IA P
ROFESSOR
, D
AKOTA
S
TATE
U
NIVERSITY AND
AUTHOR OF
The Basics of Hacking and Pen Testing
“An excellent addition to the course materials for an advanced graduate level
course on Software Security or Intrusion Detection Systems. The labs are
especially useful to students in teaching the methods to reverse-engineer,
analyze, and understand malicious software.”
—Sal
Stolfo,
P
ROFESSOR
, C
OLUMBIA
U
NIVERSITY
“The explanation of the tools is clear, the presentation of the process is
lucid, and the actual detective work fascinating. All presented clearly and
hitting just the right level so that developers with no previous experience in
this particular area can participate fully. Highly recommended.”
—Dr.
Dobb’s
“This book is like having your very own personal malware analysis teacher
without the expensive training costs.”
—Dustin
Schultz,
T
HE
X
PLOIT
“I highly recommend this book to anyone looking to get their feet wet
in malware analysis or just looking for a good desktop reference on the
subject.”
—Pete
Arzamendi,
403 L
ABS
“I do not see how anyone who has hands-on responsibility for security of
Windows systems can rationalize not being familiar with these tools.”
—Stephen
Northcutt,
SANS I
NSTITUTE
PRACTICAL
MALWARE ANALYSIS
The Hands-On Guide to
Dissecting Malicious
Software
by Michael Sikorski and Andrew Honig
San Francisco
PRACTICAL MALWARE ANALYSIS.
Copyright © 2012 by Michael Sikorski and Andrew Honig.
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior
written permission of the copyright owner and the publisher.
Fifth printing
16 15 14
56789
ISBN-10: 1-59327-290-1
ISBN-13: 978-1-59327-290-6
Publisher: William Pollock
Production Editor: Alison Law
Cover Illustration: Hugh D’Andrade
Interior Design: Octopod Studios
Developmental Editors: William Pollock and Tyler Ortman
Technical Reviewer: Stephen Lawler
Copyeditor: Marilyn Smith
Compositor: Riley Hoffman
Proofreader: Irene Barnard
Indexer: Nancy Guenther
For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly:
No Starch Press, Inc.
245 8th Street, San Francisco, CA 94103
phone: 415.863.9900; info@nostarch.com; www.nostarch.com
Library of Congress Cataloging-in-Publication Data
Sikorski, Michael.
Practical malware analysis : the hands-on guide to dissecting malicious software / by Michael Sikorski,
Andrew Honig.
p. cm.
ISBN 978-1-59327-290-6 -- ISBN 1-59327-290-1
1. Malware (Computer software) 2. Computer viruses. 3. Debugging in computer science. 4. Computer security.
I. Honig, Andrew. II. Title.
QA76.76.C68S534 2012
005.8'4--dc23
2012000214
No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and
company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark
symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the
benefit of the trademark owner, with no intention of infringement of the trademark.
The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been
taken in the preparation of this work, neither the authors nor No Starch Press, Inc. shall have any liability to any
person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the
information contained in it.
Zgłoś jeśli naruszono regulamin