The Book is a technical guide focused on understanding and countering advanced persistent threats (APTs) targeting Windows systems. It explores concepts from reverse engineering, compilers, and operating system principles to explain attack techniques from a red team perspective, including practical examples of malware and hacking methods like shellcode development, packer design, and digital signature forgery. The text also provides insights into Windows internals, such as the PE format, process memory, API calling conventions, and User Account Control (UAC) bypasses, often referencing publicly available research and tools.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Windows-APT-Warfare-Identify-effectively/dp/180461811X?&linkCode=ll1&tag=cvthunderx-20&linkId=77c6b979fcfcc06e3f208abde4295520&language=en_US&ref_=as_li_ss_tl
Published on 1 week, 5 days ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate