Summary

skip navigation

honeypots for windows
Chapter 12 - Malware Code Analysis
Honeypots for Windows
by Roger A. Grimes
Apress 2005
progress indicator progress indicatorprogress indicator progress indicator

This chapter discussed disassembling malware to discover its features and functionalities. Disassembling code requires learning assembly language, acquiring a good disassembler like IDA Pro, and learning malware techniques. The payoff is a complete understanding of what the malware or hacker was attempting to do.

This concludes Honeypots for Windows, which guided you on a journey where, for once, the good guys always win. Honeypots are our best shot for staying equal with the malicious hacker community, and perhaps even moving ahead. A honeypot is often the best computer security defense tool for the job. As an early warning system, it can alert you when all the other security defenses have failed. Becoming a honeypot administrator is joining a brotherhood of like-minded people who are doing something to improve the world.

Thanks for reading my book. Please feel free to send questions, comments, and your real-world experiences to me at roger@banneretcs.com.

progress indicator progress indicatorprogress indicator progress indicator


Honeypots for Windows
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119

Similar book on Amazon
Honeypots: Tracking Hackers
Honeypots: Tracking Hackers
Know Your Enemy: Learning about Security Threats (2nd Edition)
Know Your Enemy: Learning about Security Threats (2nd Edition)
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net