Introduction
Introduction Statistics Contact Development Disclaimer Help
Day 1 Part 16 Reverse Engineering Malware - How a Debugger Works
by Frank Poz
Thumbnail
Download
Web page
Get the class materials to follow along at
http://www.Open
SecurityTraining.info/ReverseEngineeringMalware.html[1]
Follow us on Twitter for class news @OpenSecTraining[2].
An email arrives in your inbox: "You have to check out
this picture!" It came from your friends address, which
you know and trust. It beckons you to open it. Maybe you
weren't fooled this time, but it's likely at least one of
the 50 other recipients couldn't resist.
As we store more of our confidential information on our
computers, from bank account credentials, to company
secrets, the reward to risk ratio increases as has the
number malware (malicious software) threats. While anti-
virus and intrusion detection systems have improved over
the years, nothing can substitute a skilled malware
analyst when a business needs to understand and mitigate
a network intrusion.
This class picks up where the Introduction to Reverse
Engineering of Software course left off, exploring how
static reverse engineering techniques can be used to
understand what a piece of malware does and how it can be
removed.
Topics include:
- Understanding common malware features and behavior
- Defeating code armoring and obfuscation
- Signature creation and applying prior analysis
- Dynamic analysis tools and how they can aid static
analysis
During the course students will complete many hands on
exercises.
Before taking this class you should take Introduction to
Intel x86[3] and Introduction to Reverse Engineering
Software[4] or have equivalent knowledge.
References
1. http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html (link)
2. https://twitter.com/OpenSecTraining (link)
3. http://opensecuritytraining.info/IntroX86.html (link)
4. http://opensecuritytraining.info/IntroductionToReverseEngineering.html (lin…
Date Published: 2013-06-02 12:56:50
Identifier: Day1Part16ReverseEngineeringMalware
Item Size: 39665497
Media Type: movies
# Topics
OpenSecurityTraining.info
Disassembly
Reverse Engineering
Malware
Malware Analysis
Static Analysis
IDA
IDA Pro
Debugging
Intel
x86
Intel x86
IA32
Computer security class
Computer Security
Cyber Security
CyberSecurity
Host Security
Training
Education
Multi-day-class
Multi-day-training
Classes
Computer
Computers
Security
Technology
# Collections
opensecuritytraining
computersandtechvideos
# Uploaded by
@opensecuritytraining_info
# Similar Items
View similar items
PHAROS
You are viewing proxied material from tilde.pink. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.