Muutke küpsiste eelistusi

Dissecting the Dark Web: Reverse Engineering the Tools of the Underground Economy [Pehme köide]

  • Formaat: Paperback / softback, 384 pages, kõrgus x laius: 235x178 mm, kaal: 369 g
  • Ilmumisaeg: 30-Jun-2026
  • Kirjastus: No Starch Press,US
  • ISBN-10: 1718504608
  • ISBN-13: 9781718504608
Teised raamatud teemal:
  • Pehme köide
  • Hind: 75,89 €
  • See raamat ei ole veel ilmunud. Raamatu kohalejõudmiseks kulub orienteeruvalt 3-4 nädalat peale raamatu väljaandmist.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 384 pages, kõrgus x laius: 235x178 mm, kaal: 369 g
  • Ilmumisaeg: 30-Jun-2026
  • Kirjastus: No Starch Press,US
  • ISBN-10: 1718504608
  • ISBN-13: 9781718504608
Teised raamatud teemal:
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders.

Step into the world of malware-as-a-service (MaaS) in this exploration of the tools and techniques used by threat actors in what is called the “underground economy.”

Each chapter of Dissecting the Dark Web covers a category of malicious tool regularly bought and sold on the dark web, surveys actual ads for these products to gain details about criminal operations, and walks through the reverse engineering of common malware samples to understand their inner workings.

Through real-world case studies and exercises, you’ll learn about malware types such as stealers, loaders, botnets, ransomware, and post-exploitation toolkits, as well as the many tools threat actors use to make their attacks successful, such as crypters, obfuscation, and living off the land.

Makes use of open-source reverse-engineering tools for Windows, such as Ghidra and x64dbg
Acknowledgments
Introduction

Chapter 1: A Visit to the Dark Web
Chapter
2. Vulnerabilities, Exploits, and Access
Chapter 3: Malware Delivery Techniques
Chapter 4: Information Stealers
Chapter 5: Banking Trojans
Chapter 6: Packers and Crypters
Chapter 7: Command-and-Control Frameworks
Chapter 8: Post-Exploitation Toolkits
Chapter 9: Living off the Land
Chapter 10: Windows Ransomware
Chapter 11: Linux and ESXi Ransomware
Chapter 12: Lessons from the Underground Economy

Appendix: Exercise Solutions
Index
Lindsay Kaye, expert malware analyst and reverse engineer, is Vice President of Threat Intelligence at HUMAN Security. Kaye is also an internationally recognized cybersecurity speaker, trainer, and author.