Reversing the Dark Web. Dissecting the Tools of the Underground Economy
Par :Formats :
Actuellement indisponible
Cet article est actuellement indisponible, il ne peut pas être commandé sur notre site pour le moment. Nous vous invitons à vous inscrire à l'alerte disponibilité, vous recevrez un e-mail dès que cet ouvrage sera à nouveau disponible.
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
- Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
- Compatible avec une lecture sur liseuses Vivlio
- Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement
Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
- Nombre de pages384
- FormatePub
- ISBN978-1-7185-0461-5
- EAN9781718504615
- Date de parution21/04/2026
- Protection num.pas de protection
- Infos supplémentairesepub
- ÉditeurNo Starch Press
Résumé
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders. Step into the world of malware-as-a-service (MaaS) in this exploration of the tools and techniques used by threat actors in what is called the "underground economy."Each chapter of Reversing the Dark Web covers a category of malicious tool regularly bought and sold on the dark web, surveys actual ads for these products to gain details about criminal operations, and walks through the reverse engineering of common malware samples to understand their inner workings.
Through real-world case studies and exercises, you'll learn about malware types such as stealers, loaders, botnets, ransomware, and post-exploitation toolkits, as well as the many tools threat actors use to make their attacks successful, such as crypters, obfuscation, and living off the land. Makes use of open-source reverse-engineering tools for Windows, such as Ghidra and x64dbg
Through real-world case studies and exercises, you'll learn about malware types such as stealers, loaders, botnets, ransomware, and post-exploitation toolkits, as well as the many tools threat actors use to make their attacks successful, such as crypters, obfuscation, and living off the land. Makes use of open-source reverse-engineering tools for Windows, such as Ghidra and x64dbg
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders. Step into the world of malware-as-a-service (MaaS) in this exploration of the tools and techniques used by threat actors in what is called the "underground economy."Each chapter of Reversing the Dark Web covers a category of malicious tool regularly bought and sold on the dark web, surveys actual ads for these products to gain details about criminal operations, and walks through the reverse engineering of common malware samples to understand their inner workings.
Through real-world case studies and exercises, you'll learn about malware types such as stealers, loaders, botnets, ransomware, and post-exploitation toolkits, as well as the many tools threat actors use to make their attacks successful, such as crypters, obfuscation, and living off the land. Makes use of open-source reverse-engineering tools for Windows, such as Ghidra and x64dbg
Through real-world case studies and exercises, you'll learn about malware types such as stealers, loaders, botnets, ransomware, and post-exploitation toolkits, as well as the many tools threat actors use to make their attacks successful, such as crypters, obfuscation, and living off the land. Makes use of open-source reverse-engineering tools for Windows, such as Ghidra and x64dbg