Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Malware Reverse Engineering
Introduction
1. Introduction to Expert Malware Analysis and Reverse Engineering (1:59)
2. Detailed Course Overview (6:42)
3. System Requirements for the course (4:52)
4. Setting up your malware testing lab (3:52)
5. Setting up the tools in your malware lab (3:32)
5.1 0105- setting up analysis tools in vm.mp4 (3:32)
6. Introduction to REMnux (3:37)
7. Introduction to Cyber Kill Chain (7:05)
Analyzing Malicious Files
1. Understanding Recon and Weaponization stages (6:45)
2. Spearphishing Emails as Delivery Mechanisms (5:52)
3. Analyzing Spearphishing emails and its headers (7:18)
4. Understanding Sender Policy Framework Protocol for Email Spam detection (2:11)
5. Understanding Microsoft Office File Format Structure (6:46)
6. Analyzing Malicious Office File Using Oledump - Part 1 (4:34)
6.1 Download Office File samples for analysis. Password of the zip archive is infected
7. Analyzing Malicious Office File Using Oledump - Part 2 (7:29)
7.1 Download Office File samples for analysis. Password of the zip archive is infected
8. Analyzing malicious OLE Files using Oletools - Part 1 (4:21)
8.1 Download Office File samples for analysis. Password of the zip archive is infected
9. Analyzing malicious OLE Files using Oletools - Part 2 (6:11)
9.1 Download Office File samples for analysis. Password of the zip archive is infected
10. Analyzing malicious OLE Files using Oletools - Part 3 (4:14)
10.1 Download Office File samples for analysis. Password of the zip archive is infected
11. Understanding PDF file structure - Part 1 (6:49)
11.1 Simple PDF file to analyze its structure
12. Understanding PDF file structure - Part 2 (2:38)
12.1 Simple PDF file to analyze its structure
13. Analyzing Malicious PDF files - Part 1 (5:56)
13.1 Download PDF File samples for analysis. Password of the zip archive is infected
14. Analyzing Malicious PDF files - Part 2 (6:06)
14.1 Download PDF File samples for analysis. Password of the zip archive is infected
15. Analyzing Malicious PDF file using PDF Stream Dumper (5:32)
15.1 Download PDF File samples for analysis. Password of the zip archive is infected
Network Based Analysis and Forensics
1. Packet capture and analysis - Introduction (8:18)
2. Introduction to Wireshark and packet captures (8:53)
3. Working with Wireshark Display filters (8:10)
4. Wireshark Packet capture and filter Demo (7:15)
5. Analyzing Exploit kits Through Wireshark - Part 1 (6:55)
6. Analyzing Exploit kits Through Wireshark - Part 2 (7:58)
7. Analyzing Exploit kit traffic in Pcap Demo (10:06)
7.1 Useful resource for downloading malware and Exploit kit pcaps
Teach online with
9.1 Download Office File samples for analysis. Password of the zip archive is infected
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock