Shop top categories that ship internationally
Buy new:
-28% $43.47
Delivery Saturday, January 25
Ships from: Amazon.com
Sold by: Amazon.com
$43.47 with 28 percent savings
List Price: $59.99
FREE International Returns
$11.14 Shipping & Import Charges to Canada Details

Shipping & Fee Details

Price $43.47
AmazonGlobal Shipping $8.88
Estimated Import Charges $2.26
Total $54.61

Delivery Saturday, January 25
In Stock
$$43.47 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$43.47
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon.com
Amazon.com
Ships from
Amazon.com
Sold by
Amazon.com
Amazon.com
Sold by
Amazon.com
Returns
30-day refund/replacement
30-day refund/replacement
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$37.48
FREE International Returns
Ships quick from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $35. May not include supplements such as access code, CD or DVD. TI3P:1593272901:GOOD:RTEXT Ships quick from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $35. May not include supplements such as access code, CD or DVD. TI3P:1593272901:GOOD:RTEXT See less
Delivery Saturday, January 25
Only 1 left in stock - order soon.
$$43.47 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$43.47
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

Something went wrong. Please try your request again later.

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software 1st Edition

4.8 4.8 out of 5 stars 590 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$43.47","priceAmount":43.47,"currencySymbol":"$","integerValue":"43","decimalSeparator":".","fractionalValue":"47","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"wHMcS8TXY%2FdZDSCqA3g68%2B6FQkbCrMtjuee5s2vAo3Yns6kdc7veLfPyfB%2F9FJ1KZa%2BVOTgnYHcWVdRV45s%2FnnjyRwKRGORVNMeDMA3ukhc3JQbGqj05BWptMQK2G%2FdfA462Gygvy4U08%2FuIDMkUVQ%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$37.48","priceAmount":37.48,"currencySymbol":"$","integerValue":"37","decimalSeparator":".","fractionalValue":"48","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"wHMcS8TXY%2FdZDSCqA3g68%2B6FQkbCrMtjTErgQwV%2BXCX9u3D%2F0UmD4dXxiXmBHTDyDncgeT%2FhG2T8KSDk%2BeOsh1EJaxM6e4uGjSzblDuo5lQRApZx7o4fLBzKIWD6iWVdBnEKNAf491NmfM4oAlAIT0YuCRwH1Lo1rg8XuWJzt1g7%2F4VR22VdIjmSxFmLItZ5","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

For those who want to stay ahead of the latest malware,
Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.

You'll learn how to:
–Set up a safe virtual environment to analyze malware
–Quickly extract network signatures and host-based indicators
–Use key analysis tools like IDA Pro, OllyDbg, and WinDbg
–Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques
–Use your newfound knowledge of Windows internals for malware analysis
–Develop a methodology for unpacking malware and get practical experience with five of the most popular packers
–Analyze special cases of malware with shellcode, C++, and 64-bit code

Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.

Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in
Practical Malware Analysis.

Frequently bought together

This item: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
$43.47
In Stock
Ships from and sold by Amazon.com.
+
$34.48
Get it as soon as Saturday, Jan 25
Only 15 left in stock - order soon.
Sold by Apex_media🍏 and ships from Amazon Fulfillment.
+
$40.05
In Stock
Ships from and sold by Amazon.com.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
spCSRF_Treatment
Some of these items ship sooner than the others.
Choose items to buy together.

Editorial Reviews

Amazon.com Review

Praise for Practical Malware Analysis

“The book every malware analyst should keep handy.”
--Richard Bejtlich, CSO, Mandiant & Founder of TaoSecurity

“An excellent crash course in malware analysis.”
--Dino Dai Zovi, Independent Security Consultant

“. . . the most comprehensive guide to analysis of malware, offering detailed coverage of all the essential skills required to understand the specific challenges presented by modern malware.”
--Chris Eagle, Senior Lecturer of Computer Science at the Naval Postgraduate School

“A hands-on introduction to malware analysis. I'd recommend it to anyone who wants to dissect Windows malware.”
--Ilfak Guilfanov, Creator of IDA Pro

“. . . a great introduction to malware analysis. All chapters contain detailed technical explanations and hands-on lab exercises to get you immediate exposure to real malware.”
--Sebastian Porst, Google Software Engineer

“. . . brings reverse engineering to readers of all skill levels. Technically rich and accessible, the labs will lead you to a deeper understanding of the art and science of reverse engineering. I strongly recommend this book for beginners and experts alike.”
--Danny Quist, PhD, Founder of Offensive Computing

“If you only read one malware book or are looking to break into the world of malware analysis, this is the book to get.”
--Patrick Engbretson, IA Professor at Dakota State University and Author of
The Basics of Hacking and Pen Testing

“. . . an excellent addition to the course materials for an advanced graduate level course on Software Security or Intrusion Detection Systems. The labs are especially useful to students in teaching the methods to reverse engineer, analyze and understand malicious software.”
--Sal Stolfo, Professor, Columbia University

Review

"A hands-on introduction to malware analysis. I'd recommend it to anyone who wants to dissect Windows malware."
—Ilfak Guilfanov, Creator of IDA Pro

"The book every malware analyst should keep handy."
—Richard Bejtlich, CSO of Mandiant & Founder of TaoSecurity

"This book does exactly what it promises on the cover; it's crammed with detail and has an intensely practical approach, but it's well organised enough that you can keep it around as handy reference."
—Mary Branscombe, ZDNet

"If you're starting out in malware analysis, or if you are are coming to analysis from another discipline, I'd recommend having a nose."
—Paul Baccas, Naked Security from Sophos

"An excellent crash course in malware analysis."
—Dino Dai Zovi, Independent Security Consultant

"The most comprehensive guide to analysis of malware, offering detailed coverage of all the essential skills required to understand the specific challenges presented by modern malware."
—Chris Eagle, Senior Lecturer of Computer Science at the Naval Postgraduate School

"A great introduction to malware analysis. All chapters contain detailed technical explanations and hands-on lab exercises to get you immediate exposure to real malware."
—Sebastian Porst, Google Software Engineer

"Brings reverse engineering to readers of all skill levels. Technically rich and accessible, the labs will lead you to a deeper understanding of the art and science of reverse engineering. I strongly recommend this book for beginners and experts alike. I strongly believe this will become the defacto text for learning malware analysis in the future."
—Danny Quist, PhD, Founder of Offensive Computing

“An awesome book. . . written by knowledgeable authors who possess the rare gift of being able to communicate their knowledge through the written word.”
—Richard Austin, IEEE Cipher

"If you only read one malware book or are looking to break into the world of malware analysis, this is the book to get."
—Patrick Engebretson, IA Professor at Dakota State University and Author of The Basics of Hacking and Pen Testing

"An excellent addition to the course materials for an advanced graduate level course on Software Security or Intrusion Detection Systems. The labs are especially useful to students in teaching the methods to reverse engineer, analyze and understand malicious software."
—Sal Stolfo, Professor, Columbia University

"The explanation of the tools is clear, the presentation of the process is lucid, and the actual detective work fascinating. All presented clearly and hitting just the right level so that developers with no previous experience in this particular area can participate fully. Highly recommended."
—Dr. Dobb's

"This book is like having your very own personal malware analysis teacher without the expensive training costs."
—Dustin Schultz, TheXploit

"I highly recommend this book to anyone looking to get their feet wet in malware analysis or just looking for a good desktop reference on the subject."
—Pete Arzamendi, 403 Labs

“I do not see how anyone who has hands-on responsibility for security of Windows systems can rationalize not being familiar with these tools.”
—Stephen Northcutt, SANS Institute

"
Practical Malware Analysis is another book that should be within reaching distance in anyone’s DFIR shop. I went ahead and purchased PMA hoping the book would improve my knowledge and skills when faced with malware. What I ended up with was knowledge, a process and tools I can use to analyze any program I encounter. PMA gets a five star review (5 out of 5)."
—Journey Into Incident Response

“Highly recommend it to those looking to enter the malware analysis field.”
—Linux Ninja

"If you are a beginner to this hacking field, then this book will be an excellent choice for you."
—Hackerzzz

"I cannot recommend it enough."
—Tony Robinson, Security Boulevard

Product details

  • Publisher ‏ : ‎ No Starch Press; 1st edition (February 1, 2012)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 800 pages
  • ISBN-10 ‏ : ‎ 1593272901
  • ISBN-13 ‏ : ‎ 978-1593272906
  • Item Weight ‏ : ‎ 2.74 pounds
  • Dimensions ‏ : ‎ 7.13 x 1.56 x 9.25 inches
  • Customer Reviews:
    4.8 4.8 out of 5 stars 590 ratings

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.8 out of 5 stars
590 global ratings

Review this product

Share your thoughts with other customers

Customers say

Customers find the book informative and practical. It explains everything clearly, providing knowledge of tools for analysis. They describe it as an outstanding almanac for malware analysis and R/E. The writing quality is well-written and easy to understand, with hands-on material. Many consider it a valuable purchase and a tremendous asset for those involved in the cyber field. However, opinions differ on how easy it is to follow the labs.

AI-generated from the text of customer reviews

55 customers mention "Information content"55 positive0 negative

Customers find the book informative and practical, covering a wide range of topics. It explains everything clearly and includes lab exercises. The book provides a good introduction and also covers more advanced topics later. It is described as an outstanding almanac for malware analysis and research.

"...You will work on actual malware (slightly modified to be less dangerous) using tools and techniques learned in the corresponding chapter...." Read more

"...This also includes a discussion on setting up a virtual malware analysis lab. This is often enough to determine if a file malicious on its own...." Read more

"...It's well-written and the format of the exercises is great...." Read more

"...First things first, this book has a great deal of excellent information. It's well written and thorough...." Read more

29 customers mention "Readability"29 positive0 negative

Customers find the book easy to read and well-written. They say it's the best instructional book they've purchased.

"Awesome book. Great explanations and labs that get you analyzing malware right from the start...." Read more

"...is the amount of tools can be a bit overwhelming but over all a brilliant book and if this is your calling or interest, then this is the book to own." Read more

"Awesome content and super well delivered, must have! It has been my best friend for my reverse engineering class." Read more

"Excellent book, very informative, cover just about every type of Malware (for Windows) that I can think of, including advanced techniques...." Read more

24 customers mention "Writing quality"24 positive0 negative

Customers find the book well-written and easy to read. They appreciate the clear explanations of programming concepts and hands-on material. The book provides a basic understanding of programming concepts necessary for malware analysis.

"This book is surprisingly easy to read and very informative - if you have an IT background. It is not, however, a book for beginners...." Read more

"...It's well-written and the format of the exercises is great...." Read more

"...It's well written and thorough. The screen captures could be a bit better and larger...." Read more

"...The value of the book is so great due to its thoroughness...." Read more

8 customers mention "Value for money"8 positive0 negative

Customers find the book a good value for money. They say it's worth purchasing and a valuable resource for those in the cyber field. The price is reasonable and delivery is quick.

"...The value of the book is so great due to its thoroughness...." Read more

"This book is a tremendous asset for those involved in the cyber field...." Read more

"Loved this book. Just started reading it and got pulled into it. Received the book in perfect condition." Read more

"It is very good book for me as a beginner in this field, everything is well written and easy to follow..." Read more

9 customers mention "Ease of follow"5 positive4 negative

Customers have different views on the book's ease of follow. Some find it well-written and easy to understand, jumping right into assembly code and starting with basic static and dynamic analysis. Others feel it looks complicated and difficult to complete labs, with some finding the amount of tools overwhelming.

"...The book does not spend time teaching assembly. It jumps right into the assembly code and takes off running...." Read more

"...I did have some difficulty is seeing the detail within them, but someone with stronger eyes might not have the same issues as I did...." Read more

"...PMA begins simply, starting with basic static and dynamic analysis. This also includes a discussion on setting up a virtual malware analysis lab...." Read more

"...is truly a step by step guide, the only fault is the amount of tools can be a bit overwhelming but over all a brilliant book and if this is your..." Read more

Top reviews from the United States

  • Reviewed in the United States on October 9, 2017
    This book is surprisingly easy to read and very informative - if you have an IT background. It is not, however, a book for beginners.

    At the very least, you must have a working understanding of Assembly language and the x86 architecture. With little exception, almost all advanced analysis occurs at the assembly level. The book does not spend time teaching assembly. It jumps right into the assembly code and takes off running. If you do not understand assembly code, don't even bother picking up this book (or attempting to be a malware analyst).

    Secondly, you will need to have a solid understanding of the C programming language. Much of the assembly code you will be analyzing originated from a disassembled program originally written in C.

    Your main home computer is not ideal for analyzing malware. In many cases, you have to actually run the malware to see what it does.Therefore, a virtualization environment is preferred. Unless you already have access to a virtualized lab, familiarity with VMware (or equivalent) is very helpful for setting up your own lab.

    Experience with the Windows API, registry, DLLs, and basic file structure is also helpful. All of the sample malware is tailored for Windows computers. There is an entire chapter on the Windows API to get you up to speed if you only have a basic knowledge.

    Basic knowledge of Linux is also helpful. There are a handful of analysis tools that are Linux based. You will need to have at least one Linux (virtual machine preferred) to perform some of the labs.

    A basic understanding of TCP/IP networks is also good to have. Many of the malware files have a networking component.

    Lacking any of these skill sets will make reading this book very difficult.

    The best parts of this book are the labs at the end of the chapters. You will work on actual malware (slightly modified to be less dangerous) using tools and techniques learned in the corresponding chapter. The labs guide you through important parts of the malware, and there is a detailed explanation at the end of the book describing, in detail, how the malware does its thing and how you, as the analyst, can discover its secrets.

    Most of the tools used in this book are widely available and free to use. A whole chapter is dedicated to the main tools so you get extra exposure to the important software you will be using as a professional analyst.
    61 people found this helpful
    Report
  • Reviewed in the United States on February 19, 2014
    Before I begin, I have to disclose that I am a Mandiant employee, but I don't work directly with the authors of this book, nor do I have any sort of personal relationship with them. I have also published two books with No Starch Press. While I don't analyze malware exclusively for my job, I've done a fair amount of it as an auxiliary function of my work mostly focused on network security monitoring. I've also taken the SANS FOR610 Reverse Engineering Malware course and am GREM certified. I'd consider myself an experienced, but not expert level malware analyst.

    With that said, Practical Malware Analysis is one of my absolute favorite information security books. The topic of dissecting malware can be very daunting, as it requires a broad array of knowledge to be done effectively. You have to be able to interpret code, have a knowledge of internal system workings, and be able to read between the lines using an analysts intuition. I think this book does an excellent job relaying these concepts.

    PMA begins simply, starting with basic static and dynamic analysis. This also includes a discussion on setting up a virtual malware analysis lab. This is often enough to determine if a file malicious on its own. After this, the book quickly jumps to more advanced static and dynamic analysis concepts. PMA covers a wide away of topics, and touches on most every aspect of dissecting modern malware. If you are a beginner, then you will get plenty to sink your teeth into without feeling completely overwhelmed. If you are more experienced, you will find plenty of coverage of advanced topics, such as dealing with malware that has built in anti-debugging features.

    My favorite portion of PMA are the labs included with almost every chapter. The authors have taken the time to write custom "malware" and find existing malware samples that accompany each topic. These allow the reader to try out the skills they've just learned and then compare them against a set of answers in the back of the book. I wish more books did this.

    I work from home, and at my house I have a big bookshelf in my closet and a smaller bookshelf next to my desk. The books I've read that I don't use often are in the closet bookshelf. The books I've read that I use really often stay on the smaller shelf next to the desk. Not only does Practical Malware Analysis sit on the smaller bookshelf, it sits on the top of it along side such greats as "TCP/IP Illustrated." I think that is the best praise I can give a technical book.

    Simply put, If you want to learn how to analyze malware at a casual or advanced level, then PMA is THE book to purchase. Kudos to Sikorski and Honig on a job amazingly well done.
    20 people found this helpful
    Report
  • Reviewed in the United States on December 2, 2014
    I've been working through this book over the last year and I love it. It's well-written and the format of the exercises is great. You work through a bit of theory and explanation, go through a practical exercise and then you're told to explore an executable on your own and answer some questions. The back of the book then has author-provided answers to help you get all the answers you should have.

    I had some experience with assembly and C/C++ already but nothing at a professional level. My primary lack of background was in networking but the author explained enough to at least tell me what to Google for when I needed more information.

    There's a few typos but nothing I wasn't able to figure out on my own. Luckily, the publisher is tracking these and lists them here for you: http://www.nostarch.com/malware#updates.

    Personally, I recommend running VMs. Set up an image with all the labs downloaded and saved somewhere. You'll want to revert to that snapshot before moving through the labs to ensure you're not mixing up potential system changes between labs. Sometimes, I like to go back to previous labs so I either saved snapshots after doing the lab or saved my altered binaries to a USB drive so I could reference them after reverting to the original snapshot.
    6 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • g
    5.0 out of 5 stars Muy completo
    Reviewed in Mexico on July 24, 2023
    Libro muy completo y didactico
  • MONDON A.
    5.0 out of 5 stars Intéressant
    Reviewed in France on January 10, 2024
    Cadeau pour mon fils. Il faut être passionné par le sujet et c'est le cas!
  • Snow
    5.0 out of 5 stars Awesome!
    Reviewed in the United Kingdom on December 24, 2022
    Just get it! It is a big book. Loads of stuff, but well writen and very helpful
  • Laura
    5.0 out of 5 stars Sehr gut
    Reviewed in Germany on March 4, 2021
    Das Buch gefällt mir bisher sehr gut, besonders, wenn man in das Thema einsteigt. Es gibt viele praktische Anwendungsmöglichkeiten, bei den Kapiteln zu Ida pro bin ich noch nicht sicher, ob man die praktischen Übungen auch mit der kostenlosen Version durchführen kann. Aber ich kann es trotzdem empfehlen, besonders für den Einstieg.
  • Vani
    5.0 out of 5 stars Powerful book to improve MA/RE
    Reviewed in Italy on February 12, 2021
    I'm following a Reverse Engineering course so I decided to follow this book while studying for the certification.
    I followed this book more than the study materials, to many new things. I'm gonna re-read it because it is very well done and lovely.

    This book is essential even for exploit development because teaches you malware behaviour.

    If you know the C programming language, how to stack and registers work you're welcome, if not "the art of exploitation" and then this book