000 03549cam a2200289zu 4500
001 88941404
003 FRCYB88941404
005 20250108001422.0
006 m o d
007 cr un
008 250108s2023 fr | o|||||0|0|||eng d
020 _a9789355513625
035 _aFRCYB88941404
040 _aFR-PaCSA
_ben
_c
_erda
100 1 _aNarula, Jitender
245 0 1 _aBreaking Ransomware
_bExplore ways to find and exploit flaws in a ransomware attack (English Edition)
_c['Narula, Jitender', 'Narula, Atul']
264 1 _bBPB Publications
_c2023
300 _a p.
336 _btxt
_2rdacontent
337 _bc
_2rdamdedia
338 _bc
_2rdacarrier
650 0 _a
700 0 _aNarula, Jitender
700 0 _aNarula, Atul
856 4 0 _2Cyberlibris
_uhttps://international.scholarvox.com/netsen/book/88941404
_qtext/html
_a
520 _aCrack a ransomware by identifying and exploiting weaknesses in its design Key Features ? Get an overview of the current security mechanisms available to prevent ransomware digital extortion. ? Explore different techniques to analyze a ransomware attack. ? Understand how cryptographic libraries are misused by malware authors to code ransomwares. Description Ransomware is a type of malware that is used by cybercriminals. So, to break that malware and find loopholes, you will first have to understand the details of ransomware. If you are looking to understand the internals of ransomware and how you can analyze and detect it, then this book is for you. This book starts with an overview of ransomware and its building blocks. The book will then help you understand the different types of cryptographic algorithms and how these encryption and decryption algorithms fit in the current ransomware architectures. Moving on, the book focuses on the ransomware architectural details and shows how malware authors handle key management. It also explores different techniques used for ransomware assessment. Lastly, the book will help you understand how to detect a loophole and crack ransomware encryption. By the end of this book, you will be able to identify and combat the hidden weaknesses in the internal components of ransomware. What you will learn ? Get familiar with the structure of Portable Executable file format. ? Understand the crucial concepts related to Export Directory and Export Address Table. ? Explore different techniques used for ransomware static and dynamic analysis. ? Learn how to investigate a ransomware attack. ? Get expert tips to mitigate ransomware attacks. Who this book is for This book is for cybersecurity professionals and malware analysts who are responsible for mitigating malware and ransomware attacks. This book is also for security professionals who want to learn how to prevent, detect, and respond to ransomware attacks. Basic knowledge of C/C++, x32dbg and Reverse engineering skills is a must. Table of Contents Section I: Ransomware Understanding 1. Warning Signs, Am I Infected? 2. Ransomware Building Blocks 3. Current Defense in Place 4. Ransomware Abuses Cryptography 5. Ransomware Key Management Section II: Ransomware Internals 6. Internal Secrets of Ransomware 7. Portable Executable Insides 8. Portable Executable Sections Section III: Ransomware Assessment 9. Performing Static Analysis 10. Perform Dynamic Analysis Section IV: Ransomware Forensics 11. What’s in the Memory 12. LockCrypt 2.0 Ransomware Analysis 13. Jigsaw Ransomware Analysis Section V: Ransomware Rescue 14. Experts Tips to Manage Attacks
999 _c76790
_d76790