Table of Contents
Section I: Ransomware Understanding
- Warning Signs, Am I Infected?
- Ransomware Building Blocks
- Current Defense in Place
- Ransomware Abuses Cryptography
- Ransomware Key Management
Section II: Ransomware Internals
- Internal Secrets of Ransomware
- Portable Executable Insides
- Portable Executable Sections
Section III: Ransomware Assessment
- Performing Static Analysis
- Perform Dynamic Analysis
Section IV: Ransomware Forensics
- What’s in the Memory
- LockCrypt 2.0 Ransomware Analysis
- Jigsaw Ransomware Analysis
Section V: Ransomware Rescue
- Experts Tips to Manage Attacks