logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Advanced Artefact Analysis Advanced Dynamic Analysis Toolset Document For Students Yonas Leguesse

  • SKU: BELL-7229094
Advanced Artefact Analysis Advanced Dynamic Analysis Toolset Document For Students Yonas Leguesse
$ 31.00 $ 45.00 (-31%)

4.7

56 reviews

Advanced Artefact Analysis Advanced Dynamic Analysis Toolset Document For Students Yonas Leguesse instant download after payment.

Publisher: European Union Agency for Network and Information Security
File Extension: PDF
File size: 3.78 MB
Pages: 79
Author: Yonas Leguesse, Christos Sidiropoulos, Kaarel Jõgi, Lauri Palkmets
ISBN: 9785087442400, 5087442404
Language: English
Year: 2015

Product desciption

Advanced Artefact Analysis Advanced Dynamic Analysis Toolset Document For Students Yonas Leguesse by Yonas Leguesse, Christos Sidiropoulos, Kaarel Jõgi, Lauri Palkmets 9785087442400, 5087442404 instant download after payment.

The aim of this training is to present methods and techniques of dynamic artefact analysis
with the use of OllyDbg debugger package.
Trainees will be following a code execution and unpack artefacts using the most efficient methods. In addition they will be tracing a malicious code execution. During the process trainees will learn how to counter the anti-analysis techniques implemented by malware authors.
In the second part the trainees will study various code injection techniques and how to debug hollowed processes. At the end of the training they will be presented how to automate the debugging process.
The training is performed using the Microsoft Windows operating system.

Related Products