Goodreads helps you keep track of books you want to read.
Start by marking “Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software” as Want to Read:
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Enlarge cover
Rate this book
Clear rating
Open Preview

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

4.43  ·  Rating details ·  348 Ratings  ·  15 Reviews
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as you
...more
Paperback, 800 pages
Published February 29th 2012 by No Starch Press (first published July 15th 2011)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Practical Malware Analysis, please sign up.

Be the first to ask a question about Practical Malware Analysis

Community Reviews

(showing 1-30)
Rating details
Sort: Default
|
Filter
Takedown
Oct 31, 2013 rated it it was amazing
Written by Mandiant experts, this is THE BOOK to read if you interested in malware analysis and reverse engineering. Practical, concise and easy to read, it assumes no prior knowledge and will get you started even if you are a complete beginner.
Dgg32
Jun 05, 2012 rated it it was amazing
Shelves: programming
One of the few book about the reverse engineering of malware. The scarcity alone makes the book worth reading.
Freddie Barr-Smith
Aug 25, 2018 rated it it was amazing
Very, very good, the standard introductory text for people getting into malware analysis.
Tim
Aug 19, 2017 rated it it was amazing
amazing
Hugh Smalley
Sep 14, 2016 rated it really liked it

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.



Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.


For those who w

...more
Sasha
Dec 31, 2016 rated it it was amazing
Shelves: reviewed
Took Michael Sikorski's class on malware analysis. This book perfectly complements the course (surprise!). It lays out the material in a very logical and clear way, with a heavy emphasis on practice rather than theory. That's not to say it skimps on explanations of the inner workings of the malware, it just approaches everything from a very practical standpoint. (Again, big shocker, given the title.)

The book is sectioned in order of how one would actually go about performing malware analysis:
-
...more
Jon
Feb 17, 2016 rated it really liked it
Shelves: programming
I used this book for a malware analysis class and I really enjoyed it. The content is presented in a clear manner and is kept interesting throughout. It even managed to teach me the basics of assembly language.

The "secret sauce" of this book, however, is the lab projects. You can download from their website files that you then analyze following the guidance in lab section present in most chapters. At the end of the book there are quick answers as well as a longer and more detailed explanation f
...more
sine
Apr 16, 2014 rated it it was amazing
Shelves: 2014, dev-security
Actually, this book does not only teach you how to stick with malware, but also a lot of reverse engineering stuffs and tricks, required in any RCE projects. Very clear explanation, after reading the book and finishing all the exams, it was quite easy to dissect real malware with a broad complexity, for example FinFisher.
Joshua Goller
May 26, 2013 rated it liked it
One of the best primers available for RE, but only for Windows.
Graziano Misuraca
Sep 05, 2014 rated it it was amazing
Fanstatic. Every lab is worth doing.
Bintnoor
Mar 03, 2014 rated it it was amazing
Best book explains the malware in clear and excellent manner
Courtney
Best book on malware analysis currently out there.
عَبدُالكَرِيمْ
A must read. You defiantly want to read this book if you want to enter the reverse engineering world.
Wolfgang Barthel
Oct 17, 2012 rated it it was amazing
One of the best all in one books about malware and reverse engineering in that section!
Gökmen Güreşçi
rated it it was amazing
Feb 13, 2016
Michael Moran
rated it really liked it
May 06, 2015
Binary
rated it it was amazing
Apr 30, 2016
Alok Vijayant
rated it it was amazing
Jul 21, 2017
Armando Cabrera
rated it it was amazing
Dec 15, 2016
Umut
rated it it was amazing
Oct 19, 2016
Bendik Hagen
rated it it was amazing
Nov 25, 2015
Kelly Doyle
rated it it was amazing
Nov 29, 2015
Jose R
rated it liked it
Dec 20, 2016
Joaquin Ramirez
rated it really liked it
Mar 14, 2012
Marius
rated it it was amazing
Sep 08, 2013
Edwin Tunggawan
rated it really liked it
Sep 08, 2017
Glen
rated it it was amazing
Dec 25, 2017
carlo castaneda
rated it really liked it
Feb 01, 2018
Shubham Guleria
rated it it was amazing
Dec 23, 2014
Rob G
rated it really liked it
Jul 17, 2013
« previous 1 3 4 5 6 7 8 9 10 11 12 next »
There are no discussion topics on this book yet. Be the first to start one »
  • The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
  • Metasploit: The Penetration Tester's Guide
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  • Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Reversing: Secrets of Reverse Engineering
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • Hacking the Xbox: An Introduction to Reverse Engineering
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Android Hacker's Handbook
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »