Malicious Cryptography: Exposing Cryptovirology

 

Hackers have uncovered the dark side of cryptographythat device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. Its called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what youre up against and how to fight back. Continue reading “Malicious Cryptography: Exposing Cryptovirology” »

The Art of Memory Forensics

 

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst’s Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, Continue reading “The Art of Memory Forensics” »

Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

 

Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.

The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more.

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a “toolkit” with checklists for specific tasks, case studies of difficult situations, and expert analyst tips.

  • A compendium of on-the-job tasks and checklists
  • Specific for Linux-based systems in which new malware is developed every day
  • Authors are world-renowned leaders in investigating and analyzing malicious code

Download Links

Link 1

Link 2

Link 3