Disassembler, Debuggers, & Information Gathering.Typical Attack Flow, Malware Classes, and Malware techniques.Going over operating system and assembly concepts.Setting up a safe virtual malware analysis environment.You will learn to install virtual machine software and set up networking. You will be setting up your own malware analysis environment. The course will conclude by participants performing hands-on malware analysis that consists of Triage, Static, and Dynamic analysis. You will be introduced to RE terms and processes, followed by creating a basic x86 assembly program, and reviewing RE tools and malware techniques. This workshop provides the fundamentals of reversing engineering (RE) Windows malware using a hands-on experience with RE tools and techniques.
0 Comments
Leave a Reply. |