Usr6 Posted June 12, 2013 Report Posted June 12, 2013 Creator: Matt Briggs & Frank PozLab Requirements: - Virtual machine software (VMWare is recommended).-Windows system with IDA Pro (Free 5.0 is acceptable). -Microsoft Visual Studio 2008 redistributable package.As we store more of our confidential information on our computers, from bank account credentials, to company secrets, the reward to risk ratio increases as has the number malware (malicious software) threats. While anti-virus and intrusion detection systems have improved over the years, nothing can substitute a skilled malware analyst when a business needs to understand and mitigate a network intrusion.This class picks up where the Introduction to Reverse Engineering of Software course left off, exploring how static reverse engineering techniques can be used to understand what a piece of malware does and how it can be removedTopics include: - Understanding common malware features and behavior - Defeating code armoring and obfuscation - Signature creation and applying prior analysis - Dynamic analysis tools and how they can aid static analysisCuprins:Day 1 Part 1 Prerequisites Day 1 Part 2 Analysis GoalsDay 1 Part 3 Triage, Tasks, and ToolsDay 1 Part 4 Malware Lab SetupDay 1 Part 5 Analysis MethodsDay 1 Part 6 Execution and Persistence Day 1 Part 7 Know Your ToolsDay 1 Part 8 Generic RE AlgorithmDay 1 Part 9 Data EncodingDay 1 Part 10 Data Encoding - Common Algorithms - Caesar Cipher & XOR + variantsDay 1 Part 11 Data Encoding - Common Algorithms - Base64 Day 1 Part 12 Data Encoding - Common Algorithms - Crypto Day 1 Part 13 Data Encoding - Common Algorithms - CompressionDay 1 Part 14 Data Encoding - Common Algorithms - String ObfuscationDay 1 Part 15 Data DecodingDay 1 Part 16 How a Debugger WorksDay 1 Part 17 Malware UnpackingDay 1 Part 18 Day 1 ReviewDay 2 Part 1 Network Communications - Introduction & Finding the CodeDay 2 Part 2 Network Communications - Command & Control, IndicatorsDay 2 Part 3 DLL AnalysisDay 2 Part 4 Anti-AnalysisDay 2 Part 5 Anti-Analysis ExamplesDay 2 Part 6 How CreateFile() Works Day 2 Part 7 Shellcode AnalysisMaterials(lecture, malware sample, scripts): ReverseEngineeringMalwareVideo: curs oferit de: opensecuritytraining.info 1 Quote