Reverse Engineering Deep Dive
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 5h 47m | 3.59 GB
Instructor: Cristina Gheorghisan
Deobfuscations, disassembly, shellcode analysis and beyond
What you'll learnWriting Python deobfuscation tools for AutoIt scripts.
Crafting efficient regular expressions to reduce tens of thousands of lines of obfuscated code down to manageable hundreds.
Basic functional programming concepts, to help us write elegant and cleaner code.
In-depth shellcode analysis, including extracting and reproducing find-by-hash function resolution algorithms.
Multiple in-the-wild techniques for bypassing anti-viruses.
Discovering a cryptanalysis flaw, and use it to recover an encrypted payload.
Basic steganography tricks.
Reverse engineering a couple of process injection techniques, known and unknown ones.
In-depth Metasploit shellcode deobfuscation and reversing.
RequirementsWindows 8.1 virtual machine
Install all the analysis tools
The will to learn
DescriptionThis course is logically designed to guide students gradually through some of the complicated parts of static and dynamic analysis of real-world malware. Instead of covering the topic broadly on the surface, we will take all the ramifications presented to us by the sample and use them as opportunities to deep dive and learn.
During our investigations we will cover a lot of adjacent topics. We will write Python deobfuscation scripts, embed assembly algorithms into C++ libraries, analyse steganography tricks and encryption flaws and many many more.
The course is very practical and exercises have been designed and tested for an updated Windows 8.1 operating system. There are no pre-requisites for this class other that a Windows virtual machine and the will to learn. All the 3rd party tools discussed are freely available online. Familiarity with Python and C/C++ is beneficial because these two are heavily used throughout the modules.
Who this course is for:Security testers
Malware analysts
Forensics investigators
System administrators
Information security students
rested in information security in general and reverse engineering in particular
DOWNLOAD:
- Citación :
https://rapidgator.net/file/59510c4997d8ab8c8cb34b065cd62477/5utyf.Reverse.Engineering.Deep.Dive.rar.html
https://nitroflare.com/view/A79285612FE9C71/5utyf.Reverse.Engineering.Deep.Dive.rar