Reverse Engineering Malware Training
|Commitment||5 days, 7-8 hours a day.|
|How To Pass||Pass all graded assignments to complete the course.|
|User Ratings||Average User Rating 4.8 See what learners said|
|Delivery Options||Instructor-Led Onsite, Online, and Classroom Live|
Reverse Engineering Malware Training Course – Hands-on
Learn how to perform static malware analysis with this Reverse Engineering Malware Training
Reverse engineering is a vitally important skill for today’s expert security professional. Everything from reverse engineering malware to discovering vulnerabilities in binaries are required in order to properly secure an organization from today’s ever evolving threats.
In this 5 day hands-on Reverse Engineering Malware Training course, you will gain the necessary binary analysis skills to discover the true nature of any Windows binary. With Reverse Engineering Malware Training, you will also learn how to recognize the high level language constructs (such as branching statements, looping functions and network socket code) critical to performing a thorough and professional reverse engineering analysis of a binary.
Additionally with Reverse Engineering Malware Training, you will learn how to recognize the features modern optimizing compilers, including the gcc 4.x family of compilers and the ubiquitous Visual Studio .NET. ENO Institute will train you on the standard reverse engineering programs IDA Pro, Ollydbg, and Softice. You will also learn how to use various hex editors, binary analysis programs, and code coverage analyzers.
Reverse Engineering Malware Training Course – Customize it
- We can adapt this Reverse Engineering Malware Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Reverse Engineering Malware Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Reverse Engineering Malware Training around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the training course in manner understandable to lay audiences.
Reverse Engineering Malware Training Course – Audience/Target Group
Attendees who have found this course especially useful often have responsibilities in the areas of incident response, forensic investigation, information security, threat intelligence, and threat hunting. Course participants have included:
- Individuals who have dealt with incidents involving malware and wanted to learn how to understand key aspects of malicious programs.
- Technologists who have informally experimented with aspects of malware analysis prior to the course and were looking to formalize and expand their expertise in this area.
- Forensic investigators and security practitioners looking to expand their skillsets and learn how to play a pivotal role in the incident response process.
The course begins by covering malware analysis at an introductory level, then quickly progresses to discussing tools and techniques of intermediate complexity. Neither programming experience nor knowledge of assembly is required to benefit from the course. However, you should have a general idea about core programming concepts such as variables, loops, and functions, so you can quickly grasp the relevant concepts in this area. The course spends some time discussing essential aspects of the assembly language, allowing malware analysts to navigate through malicious executables using a disassembler and a debugger.
Reverse Engineering Malware Training Course – Class Prerequisites
The knowledge and skills that a learner must have before attending this training course are:
- Have a computer system that matches the stated laptop requirements; some software needs to be installed before students come to class.
- Be familiar with using Windows and Linux operating environments and be able to troubleshoot general OS connectivity and setup issues.
- Be familiar with VMware and be able to import and configure virtual machines.
- Have a general idea about core programming concepts such as variables, loops, and functions in order to quickly grasp the relevant concepts in this area; however, no programming experience is necessary.
Reverse Engineering Malware Training Course – Objectives:
Upon completing this training course, learners will be able to meet these objectives:
- Gain the in-demand career skills of a reverse engineer. Very few information security professionals, incident response analysts and vulnerability researchers have the ability to reverse binaries efficiently. You will undoubtedly be at the top of your professional field.
- Learn the methodologies, tools, and manual reversing techniques used real world situations in our reversing lab.
- Move beyond automated “input and output” testing of binaries, commonly used by fuzzers and other analysis tools.
- More than interesting theories and lecture, get your hands dirty in our dedicated reversing lab in this security training course.
Reverse Engineering Malware Training – Course Content
Many incident response situations and computer forensics investigations cannot be completed accurately or thoroughly without understanding the runtime nature of a binary. Hackers increasingly use customized trojans that are not detected by antivirus which can only be analyzed and traced back to the original attacker via reverse engineering. Additionally, many binary programs contain vulnerabilities, such as buffer overflows and the use of very weak cryptographic algorithms. The only way to discover these critical vulnerabilities for closed-source programs is to reverse engineer them. Reverse engineering is also required in order to understand complex binary obfuscation schemes used by copy protection vendors, as well as obfuscation put in place by commercial software vendors.
• Understanding hashing functions
• Working with encrypted binaries
• Reversing UPX and other compression types
• Discovering stack overflows
• Discovering heap overflows
• Creating a sandbox to isolate malware
• Unpacking malware
• Monitoring registry changes
• Identifying malware communication channels
• Understanding Digital Rights Management (DRM) implementations
• Thwarting anti-debugger code
• Debugging multi-threaded programs
• Recursive traversal dissasemblers
• Reversing .NET bytecode
• CREA Review
• Legal issues and the DMCA
• Understanding conditional branching statements
• Virtual machines and bytecode
• System vs. Code Level reversing
• Identifying variables
• Compilers and branch prediction
• Memory management
• Win32 executable formats and image sections
• Fundamentals of IDA Pro
• Advanced uses of IDA Pro with hostile code
• Using Ollydbg for runtime analysis of malware
• Kernel mode debugging with SoftICE
• Dumping executables from memory with Dumpbin
• Locating undocumented APIs
• Reversing ntdll.dll
• Obfuscation of file formats