• XSS.stack #1 – первый литературный журнал от юзеров форума

Black hat courses

Powgritspent

floppy-диск
Пользователь
Регистрация
01.05.2023
Сообщения
6
Реакции
-3
I have found this course in an hdd that i don't really use so much, is it interesting for someone ? tell me and i will upload it, here is the summary :


blackhat.jpg

What do you learn in this course?
  • How malware and Windows internals work
  • How to create a safe and isolated lab environment for malware analysis
  • Tools and techniques to perform malware analysis
  • How to perform static analysis to determine the metadata associated with malware
  • How to perform dynamic analysis of the malware to determine its interaction with process, file system, registry, and network
  • How to perform code analysis to determine the malware functionality
  • How to debug malware using tools like IDA Pro and x64dbg
  • How to analyze downloaders, droppers, keyloggers, fileless malwares, HTTP backdoors, etc
  • Understanding various persistence techniques used by the attackers
  • Understanding different code injection techniques used to bypass security products
  • What is Memory Forensics and its use in malware and digital investigation
  • Ability to acquire a memory image from suspect/infected systems
  • How to use open source advanced memory forensics framework (Volatility)
  • Understanding of the techniques used by the malwares to hide from live forensic tools
  • Understanding of the techniques used by rootkits (code injection, hooking, etc.)
  • Investigative steps for detecting stealth and advanced malware
  • How memory forensics helps in malware analysis and reverse engineering
  • How to incorporate malware analysis and memory forensics in the sandbox
  • How to determine the network and host-based indicators (IOC)
  • Techniques to hunt malwares
The content of the course A Complete Practical Approach To Malware Analysis And Memory Forensics
first day:

  1. Introduction to Malware Analysis
  2. Static Analysis
  3. Dynamic Analysis/Behavioral analysis
  4. Automating Malware Analysis (sandbox)
  5. code analysis
  6. Introduction to Memory Forensics
  7. Volatility Overview
second day:
  1. Investigating Process
  2. Investigating Process handles & Registry
  3. Investigating Network Activities
  4. Memory Process Investigation
  5. Investigating User-Mode Rootkits & Fileless Malwares
  6. Memory Forensics in Sandbox technology
  7. Investigating Kernel-Mode Rootkits
  8. Memory Forensic Case Studies
Course link on the source website: blackhat.com/eu-21/training/schedule/a-complete-practical-approach-to-malware-analysis-and-memory-forensics
 
Последнее редактирование модератором:


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх