Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Malware Reverse Engineering
Introduction
1. Introduction to Expert Malware Analysis and Reverse Engineering (1:59)
2. Detailed Course Overview (6:42)
3. System Requirements for the course (4:52)
4. Setting up your malware testing lab (3:52)
5. Setting up the tools in your malware lab (3:32)
5.1 0105- setting up analysis tools in vm.mp4 (3:32)
6. Introduction to REMnux (3:37)
7. Introduction to Cyber Kill Chain (7:05)
Analyzing Malicious Files
1. Understanding Recon and Weaponization stages (6:45)
2. Spearphishing Emails as Delivery Mechanisms (5:52)
3. Analyzing Spearphishing emails and its headers (7:18)
4. Understanding Sender Policy Framework Protocol for Email Spam detection (2:11)
5. Understanding Microsoft Office File Format Structure (6:46)
6. Analyzing Malicious Office File Using Oledump - Part 1 (4:34)
6.1 Download Office File samples for analysis. Password of the zip archive is infected
7. Analyzing Malicious Office File Using Oledump - Part 2 (7:29)
7.1 Download Office File samples for analysis. Password of the zip archive is infected
8. Analyzing malicious OLE Files using Oletools - Part 1 (4:21)
8.1 Download Office File samples for analysis. Password of the zip archive is infected
9. Analyzing malicious OLE Files using Oletools - Part 2 (6:11)
9.1 Download Office File samples for analysis. Password of the zip archive is infected
10. Analyzing malicious OLE Files using Oletools - Part 3 (4:14)
10.1 Download Office File samples for analysis. Password of the zip archive is infected
11. Understanding PDF file structure - Part 1 (6:49)
11.1 Simple PDF file to analyze its structure
12. Understanding PDF file structure - Part 2 (2:38)
12.1 Simple PDF file to analyze its structure
13. Analyzing Malicious PDF files - Part 1 (5:56)
13.1 Download PDF File samples for analysis. Password of the zip archive is infected
14. Analyzing Malicious PDF files - Part 2 (6:06)
14.1 Download PDF File samples for analysis. Password of the zip archive is infected
15. Analyzing Malicious PDF file using PDF Stream Dumper (5:32)
15.1 Download PDF File samples for analysis. Password of the zip archive is infected
Network Based Analysis and Forensics
1. Packet capture and analysis - Introduction (8:18)
2. Introduction to Wireshark and packet captures (8:53)
3. Working with Wireshark Display filters (8:10)
4. Wireshark Packet capture and filter Demo (7:15)
5. Analyzing Exploit kits Through Wireshark - Part 1 (6:55)
6. Analyzing Exploit kits Through Wireshark - Part 2 (7:58)
7. Analyzing Exploit kit traffic in Pcap Demo (10:06)
7.1 Useful resource for downloading malware and Exploit kit pcaps
Teach online with
3. Analyzing Spearphishing emails and its headers
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock