Day 1 Part 16 Reverse Engineering Malware - How a Debugger Works | |
by Frank Poz | |
Thumbnail | |
Download | |
Web page | |
Get the class materials to follow along at | |
http://www.Open | |
SecurityTraining.info/ReverseEngineeringMalware.html[1] | |
Follow us on Twitter for class news @OpenSecTraining[2]. | |
An email arrives in your inbox: "You have to check out | |
this picture!" It came from your friends address, which | |
you know and trust. It beckons you to open it. Maybe you | |
weren't fooled this time, but it's likely at least one of | |
the 50 other recipients couldn't resist. | |
As we store more of our confidential information on our | |
computers, from bank account credentials, to company | |
secrets, the reward to risk ratio increases as has the | |
number malware (malicious software) threats. While anti- | |
virus and intrusion detection systems have improved over | |
the years, nothing can substitute a skilled malware | |
analyst when a business needs to understand and mitigate | |
a network intrusion. | |
This class picks up where the Introduction to Reverse | |
Engineering of Software course left off, exploring how | |
static reverse engineering techniques can be used to | |
understand what a piece of malware does and how it can be | |
removed. | |
Topics include: | |
- Understanding common malware features and behavior | |
- Defeating code armoring and obfuscation | |
- Signature creation and applying prior analysis | |
- Dynamic analysis tools and how they can aid static | |
analysis | |
During the course students will complete many hands on | |
exercises. | |
Before taking this class you should take Introduction to | |
Intel x86[3] and Introduction to Reverse Engineering | |
Software[4] or have equivalent knowledge. | |
References | |
1. http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html (link) | |
2. https://twitter.com/OpenSecTraining (link) | |
3. http://opensecuritytraining.info/IntroX86.html (link) | |
4. http://opensecuritytraining.info/IntroductionToReverseEngineering.html (lin… | |
Date Published: 2013-06-02 12:56:50 | |
Identifier: Day1Part16ReverseEngineeringMalware | |
Item Size: 39665497 | |
Media Type: movies | |
# Topics | |
OpenSecurityTraining.info | |
Disassembly | |
Reverse Engineering | |
Malware | |
Malware Analysis | |
Static Analysis | |
IDA | |
IDA Pro | |
Debugging | |
Intel | |
x86 | |
Intel x86 | |
IA32 | |
Computer security class | |
Computer Security | |
Cyber Security | |
CyberSecurity | |
Host Security | |
Training | |
Education | |
Multi-day-class | |
Multi-day-training | |
Classes | |
Computer | |
Computers | |
Security | |
Technology | |
# Collections | |
opensecuritytraining | |
computersandtechvideos | |
# Uploaded by | |
@opensecuritytraining_info | |
# Similar Items | |
View similar items | |
PHAROS | |