Table of contents
Contents
- Course Overview
- Setting Up a Safe Environment
- The Many Variants of Malware + Terminology
- Analysing The First Sample: A .NET Info-Stealer
- The Basics of x86 Assembly
- Learning How to Use IDA Pro Free
- Learning How to Use x32/x64Dbg
- Looking at Common API Used in Malware
- Analysing an Advanced Sample: PandaBanker
- Analysing “Plaintext” Malware – Malicious Word Documents
- Analysing Command and Control Communications + InetSim
- Common Algorithms in Malware
- Unpacking Malware – Tips and Tricks to get the Payload faster
- Link to the Presentations on Google Drive
- Downloading the Samples