Détail de l'auteur
Auteur Jitender NARULA |
Documents disponibles écrits par cet auteur (2)
Ajouter le résultat dans votre panier Faire une suggestion Affiner la recherche
Breaking Ransomware : Explore ways to find and exploit flaws in a ransomware attack (English Edition) / Jitender NARULA / BPB Publications (2023)
Titre : Breaking Ransomware : Explore ways to find and exploit flaws in a ransomware attack (English Edition) Type de document : e-book Auteurs : Jitender NARULA Editeur : BPB Publications Année de publication : 2023 ISBN/ISSN/EAN : 9789355513625 Note générale : copyrighted Langues : Anglais (eng) Résumé : Crack a ransomware by identifying and exploiting weaknesses in its design Key Features ? Get an overview of the current security mechanisms available to prevent ransomware digital extortion. ? Explore different techniques to analyze a ransomware attack. ? Understand how cryptographic libraries are misused by malware authors to code ransomwares. Description Ransomware is a type of malware that is used by cybercriminals. So, to break that malware and find loopholes, you will first have to understand the details of ransomware. If you are looking to understand the internals of ransomware and how you can analyze and detect it, then this book is for you. This book starts with an overview of ransomware and its building blocks. The book will then help you understand the different types of cryptographic algorithms and how these encryption and decryption algorithms fit in the current ransomware architectures. Moving on, the book focuses on the ransomware architectural details and shows how malware authors handle key management. It also explores different techniques used for ransomware assessment. Lastly, the book will help you understand how to detect a loophole and crack ransomware encryption. By the end of this book, you will be able to identify and combat the hidden weaknesses in the internal components of ransomware. What you will learn ? Get familiar with the structure of Portable Executable file format. ? Understand the crucial concepts related to Export Directory and Export Address Table. ? Explore different techniques used for ransomware static and dynamic analysis. ? Learn how to investigate a ransomware attack. ? Get expert tips to mitigate ransomware attacks. Who this book is for This book is for cybersecurity professionals and malware analysts who are responsible for mitigating malware and ransomware attacks. This book is also for security professionals who want to learn how to prevent, detect, and respond to ransomware attacks. Basic knowledge of C/C++, x32dbg and Reverse engineering skills is a must. Table of Contents Section I: Ransomware Understanding 1. Warning Signs, Am I Infected? 2. Ransomware Building Blocks 3. Current Defense in Place 4. Ransomware Abuses Cryptography 5. Ransomware Key Management Section II: Ransomware Internals 6. Internal Secrets of Ransomware 7. Portable Executable Insides 8. Portable Executable Sections Section III: Ransomware Assessment 9. Performing Static Analysis 10. Perform Dynamic Analysis Section IV: Ransomware Forensics 11. What’s in the Memory 12. LockCrypt 2.0 Ransomware Analysis 13. Jigsaw Ransomware Analysis Section V: Ransomware Rescue 14. Experts Tips to Manage Attacks Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88941404 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=572963 Implementing Reverse Engineering : The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking, Assembly Language, and Proven Cybersecurity Open Source Tools / Jitender NARULA / BPB Publications (2021)
Titre : Implementing Reverse Engineering : The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking, Assembly Language, and Proven Cybersecurity Open Source Tools Type de document : e-book Auteurs : Jitender NARULA Editeur : BPB Publications Année de publication : 2021 ISBN/ISSN/EAN : 9789391030377 Note générale : copyrighted Langues : Anglais (eng) Résumé : More practical less theoryKey Features? In-depth practical demonstration with multiple examples of reverse engineering concepts.? Provides a step-by-step approach to reverse engineering, including assembly instructions.? Helps security researchers to crack application code and logic using reverse engineering open source tools. ? Reverse engineering strategies for simple-to-complex applications like Wannacry ransomware and Windows calculator.DescriptionThe book ‘Implementing Reverse Engineering’ begins with a step-by-step explanation of the fundamentals of reverse engineering. You will learn how to use reverse engineering to find bugs and hacks in real-world applications. This book is divided into three sections. The first section is an exploration of the reverse engineering process. The second section explains reverse engineering of applications, and the third section is a collection of real-world use-cases with solutions.The first section introduces the basic concepts of a computing system and the data building blocks of the computing system. This section also includes open-source tools such as CFF Explorer, Ghidra, Cutter, and x32dbg. The second section goes over various reverse engineering practicals on various applications to give users hands-on experience. In the third section, reverse engineering of Wannacry ransomware, a well-known Windows application, and various exercises are demonstrated step by step.What you will learn? Understand different code calling conventions like CDECL, STDCALL, and FASTCALL with practical illustrations.? Analyze and break WannaCry ransomware using Ghidra.? Using Cutter, reconstruct application logic from the assembly code.? Hack the Windows calculator to modify its behavior.Who this book is forThis book is for cybersecurity researchers, bug bounty hunters, software developers, software testers, and software quality assurance experts who want to perform reverse engineering for advanced security from attacks. Interested readers can also be from high schools or universities (with a Computer Science background). Basic programming knowledge is helpful but not required.Table of Contents1. Impact of Reverse Engineering2. Understanding Architecture of x86 machines3. Up and Running with Reverse Engineering tools4. Walkthrough on Assembly Instructions5. Types of Code Calling Conventions6. Reverse Engineering Pattern of Basic Code7. Reverse Engineering Pattern of the printf() Program8. Reverse Engineering Pattern of the Pointer Program9. Reverse Engineering Pattern of the Decision Control Structure10. Reverse Engineering Pattern of the Loop Control Structure11. Array Code Pattern in Reverse Engineering12. Structure Code Pattern in Reverse Engineering13. Scanf Program Pattern in Reverse Engineering14. strcpy Program Pattern in Reverse Engineering15. Simple Interest Code Pattern in Reverse Engineering16. Breaking Wannacry Ransomware with Reverse Engineering17. Generate Pseudo Code from the Binary File18. Fun with Windows Calculator Using Reverse EngineeringAbout the Authors Jitender Narula is an experienced Cyber Security Specialist currently associated with the International Institute of Cyber Security (www.iicybersecurity.com) having 18+ years of industry experience. He has many years of cybersecurity experience with the government and the corporate world. In India, he has worked for law enforcement agencies (LEA), government entities like Delhi Police, ICAI (Institute of Chartered Accountants of India), Delhi University, and private organizations.LinkedIn Profile: https://in.linkedin.com/in/jitender-narula-7146123Blog Link:https://www.securitynewspaper.com/2020/04/24/employee-data-leaked-apple-google-microsoftlinkedin-intel-cisco-verizon-oracle-hp-nvidia-affected/ Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88939112 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=564507
LIBRARY - Campus Rouen
NEOMA Business School
pmb
-
59 Rue Taittinger, 51100 Reims
-
00 33 (0)3 26 77 46 15
Library Campus Reims
-
1 Rue du Maréchal Juin, BP 215
76825 Mont Saint Aignan cedex -
00 33 (0)2 32 82 58 26