In 2013, Paul RascagnÃ¨res (aka “@r00tbsd“) wrote a book titled “Malware: Identification, analyse et Ã©radication“. Paul being a friend but especially a renowned security researcher in the field of malware analysis and incident investigations, I bought the first edition of his book which was a very good introduction to malware.
A few weeks ago, I reviewed Georgia’s book about penetration testing. InÂ the same topic (pentesting), I was asked to review another one which focus on shell scripting using the bash shell. Keith Makan is the author of “Penetration Testing with the Bash Shell“.Â Bash is the default shell on many UNIX
A few weeks ago I bought Georgia Weidman’s book about penetration testing: “A Hands-On Introduction to Hacking“. Being overloaded by many projects, I finallyÂ finished reading it and it’s now time to write a quick review. Georgia is an awesome person. There are not many recognized women in the information security
I’m a Cuckoo user for a long time therefore it was a good opportunity to read the book “Cuckoo Malware Analysis” and write a quick review (The book is published by Packt Publishing). For the readers who don’t know what Cuckoo is, here is a brief introduction… Malwares are a