We called this a cookbook because each "recipe" presents both the ingredients and the steps you take resolve a specific problem or research a given threat. On the DVD, you'll find supporting files and original programs that provide additional resources. You'll learn how to analyze malware using tools written by the authors as well as hundreds of other publicly available tools. If your job involves incident response, computer forensics, systems security, or antivirus research, this book will become invaluable to you. Learn to conduct online investigations without revealing your identity;
Use honeypots to collect malware being distributed by bots and worms;
Build a low-budget malware lab with virtualization or bare bones hardware;
Reverse engineer common encoding and encryption algorithms;
Set up an advanced memory forensics platform for malware analysis;
Investigate prevalent threats such as Zeus, Silent Banker, CoreFlood, Conficker, Virut, Clampi, Bankpatch, BlackEnergy, and many more!
ON THE DVD:
Use the files on the DVD to follow along with the recipes or to conduct your own investigations and analyses. You will find:
+ Evidence files;
+ Windows and Linux tools;
+ Annotated videos;
+ Over 50 original programs in Python;
+ Source code;
+ C/C++, and Perl.