PaulDotCom mailing list archives

Re: Reverse engineering or Malware analysis.


From: Andrew Case <atcuno () gmail com>
Date: Thu, 25 Apr 2013 11:03:22 -0500

These are two of the best books on the subject in general:

http://www.amazon.com/Malware-Analysts-Cookbook-DVD-Techniques/dp/0470613033/ref=sr_1_1?ie=UTF8&qid=1366905638&sr=8-1&keywords=malware+analysts+cookbook
http://www.amazon.com/Practical-Malware-Analysis-Dissecting-Malicious/dp/1593272901/ref=sr_1_2?ie=UTF8&qid=1366905638&sr=8-2&keywords=malware+analysts+cookbook


But to really help you, you should give more information....

What is your background? (programmer, any CS / OS internals knowledge, etc)?

What type of malware are you looking to analyze (windows, linux, mac,
mobile, ...)



On Thu, Apr 25, 2013 at 5:43 AM, Jason Long <hack3rcon () yahoo com> wrote:
Hello Folks.
Can you offer me some information about Malware analysis? How can I do it?
Can you show me a book in this field?

Cheers.


_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com


Current thread: