Malware Reverse Engineering
Learn How Cybersecurity Experts Are Mitigating Advanced Malware Using Reverse Malware Engineering
Reverse engineering malware involves disassembling (and sometimes decompiling) a software program. Through this process, binary instructions are converted to code mnemonics (or higher level constructs) so that engineers can look at what the program does and what systems it impacts. Only by knowing its details are engineers then able to create solutions that can mitigate the program’s intended malicious effects. A reverse engineer (aka “reverser”) will use a range of tools to find out how a program is propagating through a system and what it is engineered to do. And in doing so, the reverser would then know which vulnerabilities the program was intending to exploit.
This course will teach you from scratch how to reverse engineer a malware and become a professional malware reverse engineer.
Course Curriculum
-
Start1. Introduction to Expert Malware Analysis and Reverse Engineering (1:59)
-
Start2. Detailed Course Overview (6:42)
-
Start3. System Requirements for the course (4:52)
-
Start4. Setting up your malware testing lab (3:52)
-
Start5. Setting up the tools in your malware lab (3:32)
-
Start5.1 0105- setting up analysis tools in vm.mp4 (3:32)
-
Start6. Introduction to REMnux (3:37)
-
Start7. Introduction to Cyber Kill Chain (7:05)
-
Start1. Understanding Recon and Weaponization stages (6:45)
-
Start2. Spearphishing Emails as Delivery Mechanisms (5:52)
-
Start3. Analyzing Spearphishing emails and its headers (7:18)
-
Start4. Understanding Sender Policy Framework Protocol for Email Spam detection (2:11)
-
Start5. Understanding Microsoft Office File Format Structure (6:46)
-
Start6. Analyzing Malicious Office File Using Oledump - Part 1 (4:34)
-
Start6.1 Download Office File samples for analysis. Password of the zip archive is infected
-
Start7. Analyzing Malicious Office File Using Oledump - Part 2 (7:29)
-
Start7.1 Download Office File samples for analysis. Password of the zip archive is infected
-
Start8. Analyzing malicious OLE Files using Oletools - Part 1 (4:21)
-
Start8.1 Download Office File samples for analysis. Password of the zip archive is infected
-
Start9. Analyzing malicious OLE Files using Oletools - Part 2 (6:11)
-
Start9.1 Download Office File samples for analysis. Password of the zip archive is infected
-
Start10. Analyzing malicious OLE Files using Oletools - Part 3 (4:14)
-
Start10.1 Download Office File samples for analysis. Password of the zip archive is infected
-
Start11. Understanding PDF file structure - Part 1 (6:49)
-
Start11.1 Simple PDF file to analyze its structure
-
Start12. Understanding PDF file structure - Part 2 (2:38)
-
Start12.1 Simple PDF file to analyze its structure
-
Start13. Analyzing Malicious PDF files - Part 1 (5:56)
-
Start13.1 Download PDF File samples for analysis. Password of the zip archive is infected
-
Start14. Analyzing Malicious PDF files - Part 2 (6:06)
-
Start14.1 Download PDF File samples for analysis. Password of the zip archive is infected
-
Start15. Analyzing Malicious PDF file using PDF Stream Dumper (5:32)
-
Start15.1 Download PDF File samples for analysis. Password of the zip archive is infected
-
Start1. Packet capture and analysis - Introduction (8:18)
-
Start2. Introduction to Wireshark and packet captures (8:53)
-
Start3. Working with Wireshark Display filters (8:10)
-
Start4. Wireshark Packet capture and filter Demo (7:15)
-
Start5. Analyzing Exploit kits Through Wireshark - Part 1 (6:55)
-
Start6. Analyzing Exploit kits Through Wireshark - Part 2 (7:58)
-
Start7. Analyzing Exploit kit traffic in Pcap Demo (10:06)
-
Start7.1 Useful resource for downloading malware and Exploit kit pcaps