Foro Wanako1
¿Quieres reaccionar a este mensaje? Regístrate en el foro con unos pocos clics o inicia sesión para continuar.

Foro Wanako1

Programas Gratuitos, Desatendidos y Mucho más!!!
 
PortalPortal  ÍndiceÍndice  BuscarBuscar  Últimas imágenesÚltimas imágenes  ConectarseConectarse  RegistrarseRegistrarse  
Buscar
 
 

Resultados por:
 
Rechercher Búsqueda avanzada
Los posteadores más activos del mes
missyou123
Advanced Ransomware Reverse  Engineering Vote_lcapAdvanced Ransomware Reverse  Engineering Voting_barAdvanced Ransomware Reverse  Engineering Vote_rcap 
tano1221
Advanced Ransomware Reverse  Engineering Vote_lcapAdvanced Ransomware Reverse  Engineering Voting_barAdvanced Ransomware Reverse  Engineering Vote_rcap 
大†Shinegumi†大
Advanced Ransomware Reverse  Engineering Vote_lcapAdvanced Ransomware Reverse  Engineering Voting_barAdvanced Ransomware Reverse  Engineering Vote_rcap 
ПΣӨƧӨFƬ
Advanced Ransomware Reverse  Engineering Vote_lcapAdvanced Ransomware Reverse  Engineering Voting_barAdvanced Ransomware Reverse  Engineering Vote_rcap 
ℛeℙ@¢ᴋ€r
Advanced Ransomware Reverse  Engineering Vote_lcapAdvanced Ransomware Reverse  Engineering Voting_barAdvanced Ransomware Reverse  Engineering Vote_rcap 
Engh3
Advanced Ransomware Reverse  Engineering Vote_lcapAdvanced Ransomware Reverse  Engineering Voting_barAdvanced Ransomware Reverse  Engineering Vote_rcap 
ronaldinho424
Advanced Ransomware Reverse  Engineering Vote_lcapAdvanced Ransomware Reverse  Engineering Voting_barAdvanced Ransomware Reverse  Engineering Vote_rcap 
*/UpLoAdEdByMaChInE028*
Advanced Ransomware Reverse  Engineering Vote_lcapAdvanced Ransomware Reverse  Engineering Voting_barAdvanced Ransomware Reverse  Engineering Vote_rcap 
geodasoft
Advanced Ransomware Reverse  Engineering Vote_lcapAdvanced Ransomware Reverse  Engineering Voting_barAdvanced Ransomware Reverse  Engineering Vote_rcap 
Septiembre 2024
LunMarMiérJueVieSábDom
      1
2345678
9101112131415
16171819202122
23242526272829
30      
CalendarioCalendario
Últimos temas
» Acoustica Mixcraft 10.5 Recording Studio Build 618 (x64) Multilingual
Advanced Ransomware Reverse  Engineering EmptyHoy a las 12:40 pm por ПΣӨƧӨFƬ

» KMSOffline 2.4.4
Advanced Ransomware Reverse  Engineering EmptyHoy a las 12:23 pm por ПΣӨƧӨFƬ

» Office 2013-2024 C2R Install + Install Lite 7.7.7.7 r17 (x86/x64)
Advanced Ransomware Reverse  Engineering EmptyHoy a las 12:22 pm por ПΣӨƧӨFƬ

» Office(R)Tool 13.0
Advanced Ransomware Reverse  Engineering EmptyHoy a las 12:21 pm por ПΣӨƧӨFƬ

» System Mechanic Ultimate Defense 24.7.0.8 Multilingual
Advanced Ransomware Reverse  Engineering EmptyHoy a las 11:22 am por tano1221

» ⭐️ PhraseExpress 17.0.98✅
Advanced Ransomware Reverse  Engineering EmptyHoy a las 10:58 am por tano1221

» System Mechanic Standard / Professional /  Defense 24.7.0.8 Multilingual
Advanced Ransomware Reverse  Engineering EmptyHoy a las 10:46 am por tano1221

» Pazu HBO Max Video Downloader 2.3.0 (x64) Multilingual
Advanced Ransomware Reverse  Engineering EmptyHoy a las 10:38 am por tano1221

» DVR Examiner 3.15.0
Advanced Ransomware Reverse  Engineering EmptyHoy a las 10:18 am por tano1221

Sondeo
Visita de Paises
free counters
Free counters

Comparte | 
 

 Advanced Ransomware Reverse Engineering

Ver el tema anterior Ver el tema siguiente Ir abajo 
AutorMensaje
Invitado
Invitado



Advanced Ransomware Reverse  Engineering Empty
MensajeTema: Advanced Ransomware Reverse Engineering   Advanced Ransomware Reverse  Engineering EmptyDom Oct 20, 2019 10:34 am

Advanced Ransomware Reverse  Engineering Dd8c0596b54689d5696e7e0aac948214
Advanced Ransomware Reverse Engineering
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 900 MB
Duration: 1 hours | Genre: eLearning Video | Language: English

Reverse engineering. Advanced Debugging, Obfuscations and Anti-Analysis. Writing decryptors

What you'll learn

This course is a continuation of our first class, Reverse Engineering Malware, but don't worry, that is not a pre-requisite. You can start with this course and just dive in. However, if you feel like starting from the basics, we encourage you to check it out!
Identify and work around anti-virtualisation techniques deployed inside malware samples
Dynamic analysis of sample's activity on a Windows box
Advanced debugging techniques
Use static analysis to discover and understand encryption algorithms
Discover, and work-around, obfuscation tricks and anti-static analysis tricks
Discover flaws that allow us to recover encrypted files
Write decryptors in Python and C
Patience and a lot of perseverance to "try harder"

Requirements

A computer that can run a Windows virtual machine.
An interest in disassembling things and understanding how they work!
Basic assembly knowledge about common instructions, registers, conditional branches
Basic programming knowledge and ability to understand simple Python and C source code

Description

Hello and welcome to our Advanced Reverse Engineering Ransomware class!

This course is a continuation of our first class, Reverse Engineering Malware, but don't worry, that is not a pre-requisite. You can start with this course and just dive in. However, if you feel like starting from the basics, we encourage you to check it out!

The aim of this course is to provide a practical approach to analysing ransomware. More specifically, we will attack the following topics:

Identify and work around anti-virtualisation techniques deployed inside malware samples

Dynamic analysis of sample's activity on a Windows box

Advanced debugging techniques

Use static analysis to discover and understand encryption algorithms

Discover, and work-around, obfuscation tricks and anti-static analysis tricks

Discover flaws that allow us to recover encrypted files

Write decryptors in Python and C

The course begins by going through the necessary precaution measures when working with malware, then quickly dives in analysing actual samples. Since Windows is by far the most popular target platform, we will focus on this operating system.

Neither professional programming experience nor assembly language knowledge are required to benefit from the course, although they would be very helpful when we'll look at identifying encryption algorithms and bypass anti-virtualisation checks. The concepts will be explained in a clear and concise manner and additional resources will be recommended.

Some programming experience will be very beneficial when we'll start writing decryptors. However, the focus will be mostly on understanding the algorithms and specifically what information we need to do successful decryptions. For this reason, full Python and C source code will be provided.

To get the most out of this course, we recommended to exercise all the steps described within the lectures and whenever a concept or idea is not fully explained or clearly understood, either reached out with questions on the Q&A section or consult online resources.

Why take this course?

Mostly because you like a practical malware analysis course focused on a real threat - ransomware. Also because you're curious how ransomware are reversed by people or companies that routinely write public decryptors.

This course intention is to be useful and interesting to everybody involved in information security and malware analysis, from students to security testers and forensic investigators.

If you decide you love reverse engineering and wish to further develop your skills, other resources will be suggested along the way.

The course will explain how to use process monitoring tools, hex editors, debuggers and disassemblers.

A lot of the concepts and analysis strategies presented here apply to analysing malware in general.

Once you have completed this training course, you will be more confident and capable to identify anti-virtualisation and anti-static analysis tricks.

You will also be able to debug your samples in any debugger and disassembler.

You will be able to identify encryption algorithms and write decryptors for your own samples.

Samples and scripts are included, so you can follow along with us throughout the lessons. IDA scripts, Python and C source code is provided for various tasks needed throughout the class.

Who is this course for?

This course is for anyone interested in information security in general and malware analysis in particular, including but not only:

Security testers

Malware analysts

Forensics investigators

System administrators

Information security students

Who this is not?

This course is not an introduction to malware. It only focuses on the sub-topic of ransomware.

Basic experience with assembly and programming languages will be very helpful, because this is not an introduction to assembly.

Although safety issues are presented, this is not a tutorial on how to configure a malware analysis virtual environment.

Although general information is presented, this is not an elaborate high-level description of ransomware.

Solutions for attempting to reverse the encryption process and recover files are presented, but this is not a course about how to prevent ransomware in the first place.

Basic familiarity with reverse engineering concepts would be very useful, because this is not an introduction to reverse engineering.

Although it should be obvious, this is not a tutorial on how to write better ransomware.

What am I going to get?

The lectures, videos and other resources will provide you with relevant information about current malware analysis tricks

You will learn how to confidently use any debugger and disassembler

You will learn to identify flaws in the ransomware code or encryption logic

You will learn how to write scripts for IDA Pro

You will get a relevant quiz at the end to test your understanding

Python and C source code for the decryptors and IDA scripts

Minimum requirements :

At minimum, you will have:

A computer that can run a Windows virtual machine.

An interest in disassembling things and understanding how they work!

Basic assembly knowledge about common instructions, registers, conditional branches

Basic programming knowledge and ability to understand simple Python and C source code

Who this course is for:

Security testers
Malware analysts
Forensics investigators
System administrators
Information security students

Advanced Ransomware Reverse  Engineering 9f2c7f014adae8a970efeed7f02f33b8


Download link:
Citación :
rapidgator_net:
https://rapidgator.net/file/08911feb7439e242689ae24d98bf8e69/7c6jg.Advanced.Ransomware.Reverse.Engineering.part1.rar.html
https://rapidgator.net/file/7afb6566e337b77574102cc68bbdf3f6/7c6jg.Advanced.Ransomware.Reverse.Engineering.part2.rar.html

nitroflare_com:
https://nitroflare.com/view/9709B484059B067/7c6jg.Advanced.Ransomware.Reverse.Engineering.part1.rar
https://nitroflare.com/view/94593EFE07201F4/7c6jg.Advanced.Ransomware.Reverse.Engineering.part2.rar

uploadgig_com:
http://uploadgig.com/file/download/655c9c6c68E42644/7c6jg.Advanced.Ransomware.Reverse.Engineering.part1.rar
http://uploadgig.com/file/download/530Ce0e8507EE41c/7c6jg.Advanced.Ransomware.Reverse.Engineering.part2.rar

Links are Interchangeable - No Password - Single Extraction
Volver arriba Ir abajo
 

Advanced Ransomware Reverse Engineering

Ver el tema anterior Ver el tema siguiente Volver arriba 
Página 1 de 1.

 Temas similares

-
» Reverse Engineering Ransomware
» Reverse Engineering Essentials
» Reverse Engineering .NET with dnSpy
» Reverse Engineering: IDA For Beginners
» Android Reverse Engineering From Scratch

Permisos de este foro:No puedes responder a temas en este foro.
Foro Wanako1 :: Programas o Aplicaciónes :: Ayuda, Tutoriales-