Reverse Engineering Malwares

Introduction to Concept of Malware, their Functionality, Types, etc

This course introduces the concept of malware, how they function, their types and how they are extensively used in Advanced Persistent attacks (APT's) to siphon off the critical business information from an organization on regular basis. We start off with the concepts of Process explorer, disassembling v/s debugging with advanced debugging features. We also set breakpoints to crack down an application dissecting it to the level where malware code is present.

A practice malware lab session is now setup consisting of virtual machines and sandbox environment. We use ReMux, honeypots and online analysis services to track the movement of the malware across the virtual network. We are able to do malware analysis based on the activity monitoring. We now delve deep into the techniques used for analysis of malware such as process dumping, Live Analysis, analyzing Anti-virus evasion and so on. Further we take a peek at advanced malware methodologies which enable us to capture memory dumps, infect PDF and MS office documents and detect and analyze shell code.

Course Contents

  • Case Studies
  • Taxonomy of malwares
  • Assemble Language for Malware Research
  • Types and Infection Concepts
  • Advance Persistent Threats v/s Malwares
  • Concept of PE
  • Understanding PE Header
  • Disassembling v/s Debugging
  • Introduction to Debuggers
    • Ollydbg
    • IDA Pro
  • Advanced Debugging Concepts
  • Setting Breakpoints
  • Debugging an Application
  • "Cracking” a Demo Application
  • Virtual Machines
  • Sandbox Concept
  • Working with REMnux
  • Honeypots
  • Online Analysis services
  • Malware Analysis Methodologies
    • Passive Analysis
    • Active Analysis
  • Concept of Disassembling
  • Identifying Packers & Crypters
  • Process Dumping
  • Intercepting Reverse CallBack
  • Live Analysis using sysinternals
  • Understanding/Analyzing AV Evasion
  • Capturing and Analyzing Infected Memory
  • Anti-Forensics/Anti-Debugging Malwares
  • Malwares in Browser
  • Shell Code Detection & Analysis
  • Issues with PDF and MS Office documents
  • Analyzing malicious infected documents
  • Extraction & Analyzing Methodologies

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content