Have a personal or library account? Click to login
Windows APT Warfare Cover

Windows APT Warfare

Identify and prevent Windows APT attacks effectively

Paid access
|May 2024
Product purchase options

Table of Contents

  1. From Source to Binaries – The Journey of a C Program
  2. Process Memory – File Mapping, PE Parser, tinyLinker, and Hollowing
  3. Dynamic API Calling – Thread, Process, and Environment Information
  4. Shellcode Technique – Exported Function Parsing
  5. Application Loader Design
  6. PE Module Relocation
  7. PE to Shellcode – Transforming PE Files into Shellcode
  8. Software Packer Design
  9. Digital Signature – Authenticode Verification
  10. Reversing User Account Control and Bypassing Tricks
  11. Appendix – NTFS, Paths, and Symbols
PDF ISBN: 978-1-80461-721-2
Publisher: Packt Publishing Limited
Copyright owner: © 2023 Packt Publishing Limited
Publication date: 2024
Language: English
Pages: 258