Sign up to save your library
With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.
Find this title in Libby, the library reading app by OverDrive.

Search for a digital library with this title
Title found at these libraries:
Library Name | Distance |
---|---|
Loading... |
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders.
Step into the world of malware-as-a-service (MaaS) in this exploration of the tools and techniques used by threat actors in what is called the “underground economy.”
Each chapter of Reversing the Dark Web covers a category of malicious tool regularly bought and sold on the dark web, surveys actual ads for these products to gain details about criminal operations, and walks through the reverse engineering of common malware samples to understand their inner workings.
Through real-world case studies and exercises, you’ll learn about malware types such as stealers, loaders, botnets, ransomware, and post-exploitation toolkits, as well as the many tools threat actors use to make their attacks successful, such as crypters, obfuscation, and living off the land.
Makes use of open-source reverse-engineering tools for Windows, such as Ghidra and x64dbg
Step into the world of malware-as-a-service (MaaS) in this exploration of the tools and techniques used by threat actors in what is called the “underground economy.”
Each chapter of Reversing the Dark Web covers a category of malicious tool regularly bought and sold on the dark web, surveys actual ads for these products to gain details about criminal operations, and walks through the reverse engineering of common malware samples to understand their inner workings.
Through real-world case studies and exercises, you’ll learn about malware types such as stealers, loaders, botnets, ransomware, and post-exploitation toolkits, as well as the many tools threat actors use to make their attacks successful, such as crypters, obfuscation, and living off the land.
Makes use of open-source reverse-engineering tools for Windows, such as Ghidra and x64dbg