HomeНаука и техникаRelated VideosMore From: Open SecurityTraining

Reverse Engineering Malware Day 1 Part 12: Data Encoding - Common Algorithms - Crypto

3 ratings | 1244 views
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining. The playlist for this class is here: http://bit.ly/Zmb771 An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our computers, from bank account credentials, to company secrets, the reward to risk ratio increases as has the number malware (malicious software) threats. While anti-virus and intrusion detection systems have improved over the years, nothing can substitute a skilled malware analyst when a business needs to understand and mitigate a network intrusion. This class picks up where the Introduction to Reverse Engineering of Software course left off, exploring how static reverse engineering techniques can be used to understand what a piece of malware does and how it can be removed. Topics include: - Understanding common malware features and behavior - Defeating code armoring and obfuscation - Signature creation and applying prior analysis - Dynamic analysis tools and how they can aid static analysis During the course students will complete many hands on exercises. Before taking this class you should take Introduction to Intel x86 and Introduction to Reverse Engineering Software or have equivalent knowledge.
Html code for embedding videos on your blog
Text Comments (1)
binaryD3struct0r (3 years ago)
The way the IDA Pro displays in this course was filmed is much better than that magnifier used in the intro to RE course.

Would you like to comment?

Join YouTube for a free account, or sign in if you are already a member.