Introduction to Reverse Engineering Malware

1 Day Course
Hands On
Code QAIREMAL

Book Now - 2 Delivery Methods Available:

Scheduled Virtual Onsite

Overview

This course is a one day introduction to reverse engineering malware in the Linux environment. Delegates will be guided through the entire process gaining new skills and experience reverse engineering malicious software with an insight in to the techniques used by malware to spread and infect other machines and devices and obfuscate their activity.

Delegates will gain hands on experience using decompilers, debuggers, network traffic analysis tools, hex editors and memory analysis tools.

This course is aimed at an introductory level to those wishing to learn both the basics and advanced techniques used to reverse engineer software. This course would be ideal for incident responders who want to take a more proactive role in analyzing identified threats.

This course will be suitable for delegates interested in the SANS Institute course FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques.

Objectives

  • The many different types of Linux malware
  • The dangers of IOT and the Mirai botnet
  • How to identify malware in the Linux environment
  • How to dissect and analyse a malicious binary application
  • How to dump and analyse malicious binary applications from memory (RAM)
  • How to manipulate malware with decompilers and hex editors
  • How to perform traffic analysis of malicious software in a sandboxed environment
  • How to identify and block the command and control centre used by the malware
  • How to analyse the threat and impact of the malware

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.

Modules

Hide all

Identifying Malware (6 topics)

  • Identifying different types of malware
  • The dangers of IOT and embedded devices
  • The Mirai botnet
  • Malware obfuscation methods
  • Malware analysis tools and techniques
  • Identifying malware in the Linux environment

Analysing malware (8 topics)

  • Creating a safe virtual/sandboxed environments to analyse malware
  • Using GDB and OllyDBG to dissect malware
  • Using hex dump and hex edit to manipulate malware
  • Identifying the C&C and recreating the C&C for further analysis
  • Performing network traffic analysis of malware using tcpdump/Wireshark
  • Analysing memory resident malware
  • Understanding the threat
  • Mitigating the threat

Prerequisites

Experience with Linux is advantageous however it is not essential as the instructor will guide the delegates through each task.

Scheduled Dates

Please select from the dates below to make an enquiry or booking.

Pricing

Different pricing structures are available including special offers. These include early bird, late availability, multi-place, corporate volume and self-funding rates. Please arrange a discussion with a training advisor to discover your most cost effective option.

Code Location Duration Price Nov Dec Jan Feb Mar Apr
QAIREMAL
Manchester (Oxford St)
1 Day $878
11

Course PDF

Print

Share this Course

+1
Share

Recommend this Course

Sections