HHIDE_DUMP
Гость
H
HHIDE_DUMP
Гость
Сливаю курс от Kaspersky Lab из офицальных источников
Malware Analysis & Reverse Engineering
These courses are intended for security researchers and incident response personnel, malware analysts, security engineers, network security analysts, APT hunters and IT security staff. Students will become familiar with the scope of reverse engineering applications, assembly language, corresponding tools, common techniques used by malware authors to maintain persistence, avoid detection, inject into system processes memory etc. The advanced course will cover most of the steps required to analyze a modern APT toolkit, from receiving the initial sample, all the way to producing a deep technical description with IOCs.
• Basic analysis using IDA Pro
• Dynamic analysis using popular virtualization solutions and debuggers
• Malicious documents analysis
• Unpacking • Decryption
• Shellcodes analysis
• Exploit analysis
• Reversing tips and tricks
• Get preliminary knowledge about OS and assembly language
• Conduct static and dynamic malware analysis obtaining full understanding of its behavior and functionality
• Deal with malware anti-analysis tricks, self-protective techniques and protection software bypasses
• Identify and reverse engineer standalone and embedded shellcodes
• Be able to analyze PDF exploits from scratch
Скачать :
Подписаться на мой телеграм канал :
Пожалуйста,
Вход
или
Регистрация
для просмотра содержимого URL-адресов!
Malware Analysis & Reverse Engineering
These courses are intended for security researchers and incident response personnel, malware analysts, security engineers, network security analysts, APT hunters and IT security staff. Students will become familiar with the scope of reverse engineering applications, assembly language, corresponding tools, common techniques used by malware authors to maintain persistence, avoid detection, inject into system processes memory etc. The advanced course will cover most of the steps required to analyze a modern APT toolkit, from receiving the initial sample, all the way to producing a deep technical description with IOCs.
• Basic analysis using IDA Pro
• Dynamic analysis using popular virtualization solutions and debuggers
• Malicious documents analysis
• Unpacking • Decryption
• Shellcodes analysis
• Exploit analysis
• Reversing tips and tricks
• Get preliminary knowledge about OS and assembly language
• Conduct static and dynamic malware analysis obtaining full understanding of its behavior and functionality
• Deal with malware anti-analysis tricks, self-protective techniques and protection software bypasses
• Identify and reverse engineer standalone and embedded shellcodes
• Be able to analyze PDF exploits from scratch
Скачать :
Пожалуйста,
Вход
или
Регистрация
для просмотра содержимого URL-адресов!
Подписаться на мой телеграм канал :
Пожалуйста,
Вход
или
Регистрация
для просмотра содержимого URL-адресов!