Reversing the Dark Web: Dissecting the Tools of the Underground Economy
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders.

Step into the world of malware-as-a-service (MaaS) in this exploration of the tools and techniques used by threat actors in what is called the “underground economy.”

Each chapter of Reversing the Dark Web covers a category of malicious tool regularly bought and sold on the dark web, surveys actual ads for these products to gain details about criminal operations, and walks through the reverse engineering of common malware samples to understand their inner workings.

Through real-world case studies and exercises, you’ll learn about malware types such as stealers, loaders, botnets, ransomware, and post-exploitation toolkits, as well as the many tools threat actors use to make their attacks successful, such as crypters, obfuscation, and living off the land.

Makes use of open-source reverse-engineering tools for Windows, such as Ghidra and x64dbg
1147946843
Reversing the Dark Web: Dissecting the Tools of the Underground Economy
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders.

Step into the world of malware-as-a-service (MaaS) in this exploration of the tools and techniques used by threat actors in what is called the “underground economy.”

Each chapter of Reversing the Dark Web covers a category of malicious tool regularly bought and sold on the dark web, surveys actual ads for these products to gain details about criminal operations, and walks through the reverse engineering of common malware samples to understand their inner workings.

Through real-world case studies and exercises, you’ll learn about malware types such as stealers, loaders, botnets, ransomware, and post-exploitation toolkits, as well as the many tools threat actors use to make their attacks successful, such as crypters, obfuscation, and living off the land.

Makes use of open-source reverse-engineering tools for Windows, such as Ghidra and x64dbg
59.99 Pre Order
Reversing the Dark Web: Dissecting the Tools of the Underground Economy

Reversing the Dark Web: Dissecting the Tools of the Underground Economy

by Lindsay Kaye
Reversing the Dark Web: Dissecting the Tools of the Underground Economy

Reversing the Dark Web: Dissecting the Tools of the Underground Economy

by Lindsay Kaye

Paperback

$59.99 
  • SHIP THIS ITEM
    Available for Pre-Order. This item will be released on April 21, 2026

Related collections and offers


Overview

A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders.

Step into the world of malware-as-a-service (MaaS) in this exploration of the tools and techniques used by threat actors in what is called the “underground economy.”

Each chapter of Reversing the Dark Web covers a category of malicious tool regularly bought and sold on the dark web, surveys actual ads for these products to gain details about criminal operations, and walks through the reverse engineering of common malware samples to understand their inner workings.

Through real-world case studies and exercises, you’ll learn about malware types such as stealers, loaders, botnets, ransomware, and post-exploitation toolkits, as well as the many tools threat actors use to make their attacks successful, such as crypters, obfuscation, and living off the land.

Makes use of open-source reverse-engineering tools for Windows, such as Ghidra and x64dbg

Product Details

ISBN-13: 9781718504608
Publisher: No Starch Press
Publication date: 04/21/2026
Pages: 384
Product dimensions: 7.00(w) x 9.25(h) x (d)

About the Author

Lindsay Kaye is an expert malware analyst and reverse engineer who loves taking on technical challenges of all kinds. She speaks regularly at international conferences such as REcon, Disobey, SEC-T, FIRST, and numerous BSides events. In addition to speaking, she leads training sessions and workshops that help others develop skills in the technical aspects of cybersecurity. Lindsay currently leads the Threat Intelligence team at a New York-based cybersecurity company, building on her career from software engineer to reverse engineer to technical team leadership. A New York City native, Lindsay obtained her BS in Engineering from Olin College of Engineering before receiving her MBA from Babson College.

Table of Contents

Introduction

Chapter 1: A Visit to the Dark Web
Chapter 2. Initial Access Methods
Chapter 3: Loaders and Botnets
Chapter 4: Information Stealers
Chapter 5: Banking Trojans
Chapter 6: Packers and Crypters
Chapter 7: Command-and-Control Frameworks
Chapter 8: Post-Exploitation Toolkits
Chapter 9: Living off the Land
Chapter 10: Windows Ransomware
Chapter 11: Linux and ESXi Ransomware
Chapter 12: Lessons from the Underground Economy

Appendix: Exercise Solutions
From the B&N Reads Blog

Customer Reviews