Acknowledgments |
|
xv | |
Foreword |
|
xvii | |
Introduction |
|
xxi | |
|
PART I Establishing the Foundation |
|
|
|
|
3 | (6) |
|
|
4 | (1) |
|
A Brief Overview of the Threat Landscape |
|
|
5 | (1) |
|
Threat to National Security |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
2 A Brief History of Malware |
|
|
9 | (30) |
|
|
10 | (7) |
|
Classification of Computer Viruses |
|
|
11 | (5) |
|
|
16 | (1) |
|
|
17 | (16) |
|
Classification of Malware |
|
|
18 | (11) |
|
|
29 | (4) |
|
|
33 | (2) |
|
Classification of Riskware |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (3) |
|
|
39 | (16) |
|
|
40 | (1) |
|
|
41 | (6) |
|
The Operating System Kernel |
|
|
41 | (1) |
|
User Mode and Kernel Mode |
|
|
41 | (1) |
|
|
42 | (1) |
|
Switching from User Mode to Kernel Mode |
|
|
43 | (4) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (5) |
|
|
48 | (3) |
|
|
51 | (1) |
|
Direct Kernel Object Manipulation |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (30) |
|
|
56 | (8) |
|
|
57 | (1) |
|
|
58 | (2) |
|
|
60 | (4) |
|
|
64 | (5) |
|
Distributed Denial of Service Attack |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (2) |
|
|
68 | (1) |
|
Large-Scale Information Harvesting |
|
|
69 | (1) |
|
|
69 | (1) |
|
Botnet Protective Mechanisms |
|
|
69 | (8) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (3) |
|
|
74 | (3) |
|
The Fight Against Botnets |
|
|
77 | (4) |
|
|
78 | (1) |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
82 | (3) |
|
PART II Welcome to the Jungle |
|
|
|
|
85 | (28) |
|
|
86 | (16) |
|
|
86 | (11) |
|
|
97 | (4) |
|
The Evolution of the Threat Ecosystem |
|
|
101 | (1) |
|
Advanced Persistent Threat |
|
|
102 | (6) |
|
|
102 | (4) |
|
|
106 | (2) |
|
|
108 | (3) |
|
|
108 | (3) |
|
|
111 | (2) |
|
|
113 | (42) |
|
The Need to Evade Antivirus |
|
|
115 | (26) |
|
Malware Incident Handling Process |
|
|
116 | (7) |
|
|
123 | (6) |
|
Circumventing the Antivirus Product |
|
|
129 | (12) |
|
The Need for an Army of Malware |
|
|
141 | (4) |
|
Next-Generation Malware Kits |
|
|
141 | (1) |
|
Stand-Alone Armoring Tools |
|
|
142 | (2) |
|
The Impact of an Armored Army of Malware |
|
|
144 | (1) |
|
|
145 | (10) |
|
The Malware Assembly Line |
|
|
145 | (7) |
|
The Proliferation of Attacker Tools |
|
|
152 | (1) |
|
Malware Population Explosion |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (30) |
|
|
156 | (27) |
|
|
159 | (1) |
|
|
160 | (4) |
|
Instant Messaging and Chat |
|
|
164 | (2) |
|
|
166 | (5) |
|
|
171 | (8) |
|
|
179 | (1) |
|
|
179 | (4) |
|
The Potential of Becoming an Infection Vector |
|
|
183 | (1) |
|
|
183 | (2) |
|
|
185 | (28) |
|
|
186 | (1) |
|
The Malware Infection Process |
|
|
187 | (13) |
|
Installation of Malware Files |
|
|
191 | (5) |
|
Setting Up Malware Persistency |
|
|
196 | (1) |
|
Removing Evidence of the Malware Installer |
|
|
197 | (1) |
|
Passing Control to the Malware |
|
|
198 | (2) |
|
|
200 | (8) |
|
|
201 | (3) |
|
Communicating with the Attacker |
|
|
204 | (3) |
|
|
207 | (1) |
|
|
208 | (5) |
|
PART III The Enterprise Strikes Back |
|
|
|
9 Protecting the Organization |
|
|
213 | (42) |
|
The Threat Incident Responders |
|
|
215 | (1) |
|
Understanding the Value of the System |
|
|
216 | (8) |
|
Value to the Organization |
|
|
216 | (5) |
|
|
221 | (3) |
|
Understanding the Characteristics of the System |
|
|
224 | (7) |
|
|
225 | (2) |
|
|
227 | (1) |
|
Sensitivity of Hosted Data |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
Accessibility to the Asset |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
The Organization's Security Posture |
|
|
232 | (1) |
|
Understanding the Cost of Compromise |
|
|
232 | (2) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (9) |
|
|
234 | (2) |
|
Identifying the Appropriate Solutions |
|
|
236 | (3) |
|
Proactive Threat Detection |
|
|
239 | (4) |
|
Creating an Incident Response Plan |
|
|
243 | (9) |
|
Identify Different Compromise Scenarios |
|
|
244 | (1) |
|
Identify Solution Patterns |
|
|
244 | (1) |
|
Define Roles and Responsibilities |
|
|
245 | (2) |
|
|
247 | (2) |
|
Conduct Periodic Dry-Runs |
|
|
249 | (1) |
|
|
250 | (2) |
|
Putting Everything into Action |
|
|
252 | (1) |
|
|
252 | (1) |
|
|
252 | (3) |
|
|
255 | (18) |
|
|
256 | (2) |
|
Establishing a Network Baseline |
|
|
257 | (1) |
|
Establishing a Host Baseline |
|
|
257 | (1) |
|
|
258 | (3) |
|
Detecting Network Anomalies |
|
|
259 | (1) |
|
|
260 | (1) |
|
Isolating the Source of the Anomaly |
|
|
261 | (1) |
|
Diving into the Compromised Asset |
|
|
261 | (11) |
|
|
261 | (9) |
|
Classifying the Malware Based on Its Attack Directive |
|
|
270 | (2) |
|
|
272 | (1) |
|
|
273 | (24) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
276 | (2) |
|
|
276 | (1) |
|
|
276 | (1) |
|
Threat Detection and Classification |
|
|
277 | (1) |
|
Remediation and Restoration |
|
|
277 | (1) |
|
|
278 | (12) |
|
|
279 | (10) |
|
Conducting a Periodic Security Audit |
|
|
289 | (1) |
|
|
290 | (3) |
|
Who Are the Insider Threats? |
|
|
290 | (1) |
|
Mitigating the Insider Threat |
|
|
290 | (3) |
|
|
293 | (1) |
|
|
293 | (4) |
|
|
|
|
297 | (10) |
|
|
298 | (1) |
|
A Short Review of the Book |
|
|
298 | (1) |
|
|
299 | (5) |
|
|
299 | (4) |
|
|
303 | (1) |
|
|
304 | (1) |
|
The Good Guys Are Busy Too |
|
|
304 | (1) |
|
The Adventure Has Just Begun |
|
|
305 | (1) |
|
|
305 | (2) |
|
|
307 | (4) |
|
The Windows Bootup Process |
|
|
308 | (3) |
|
|
308 | (2) |
|
|
310 | (1) |
|
|
311 | (4) |
|
Vulnerability Information |
|
|
312 | (1) |
|
Free Online Security Products |
|
|
312 | (1) |
|
Free File Scanner and Analysis Tools |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (2) |
Glossary |
|
315 | (18) |
Index |
|
333 | |