
Windows APT Warfare
Identify and prevent Windows APT attacks effectively
Publisher:Packt Publishing Limited
By: Sheng-Hao Ma, Ziv Chang and Federico Maggi
Paid access
|May 2024Table of Contents
- From Source to Binaries – The Journey of a C Program
- Process Memory – File Mapping, PE Parser, tinyLinker, and Hollowing
- Dynamic API Calling – Thread, Process, and Environment Information
- Shellcode Technique – Exported Function Parsing
- Application Loader Design
- PE Module Relocation
- PE to Shellcode – Transforming PE Files into Shellcode
- Software Packer Design
- Digital Signature – Authenticode Verification
- Reversing User Account Control and Bypassing Tricks
- Appendix – NTFS, Paths, and Symbols
PDF ISBN: 978-1-80461-721-2
Publisher: Packt Publishing Limited
Copyright owner: © 2023 Packt Publishing Limited
Publication date: 2024
Language: English
Pages: 258
Related subjects:
