Company: Pluralsight Author: Josh Stroschein Full Title: Malware Analysis: Identifying And Defeating Packing Year: 2019 Language: English Genre: Educational: Security Skill Level: Intermediate Price: - - Files: MP4 (+ Slides .PDF) Time: 02:17:25 Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 150 kbps Audio: AAC at 93 Kbps, 2 channels, 44.1 KHz Malware authors routinely utilize packing techniques to complicate the analysis of their code. This course will teach you techniques for identifying and defeating packing so that key characteristics and behaviors can be identified. Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. One such technique is packing, in which a malicious program is layered inside another program. In Malware Analysis: Identifying and Defeating Packing, you will gain the skills necessary to not only identify prevalent packing techniques, but also how to effectively defeat them. First, you will learn how packers work and how malware authors regularly use them. Next, you will learn how to detect common packers and methods for unpacking. Finally, you will learn about custom packers, how you can identify them and effective ways for defeating them. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware packing techniques with such tools as IDA Pro and WinDbg, by the end of this course you will have the knowledge and skills to effectively tackle packing! Lessons: 1. Course Overview 01. Course Overview 2. Why Packing Affects Your Analysis 02. Course Introduction 03. Why Malware Authors Pack Code 04. Module Introduction 05. Common Packing Scenarios 06. What You Should Know 07. Conclusion 3. How Packers Work 08. Module Introduction 09. Detecting Signs of Packing 10. Demo: Packikng a "Hello World" 11. Detecting Packers with Signatures 12. Demo: Packer Detection with Tools 13. Lab: Identification and Unpacking 14. Conclusion 4. Identifying Custom Packers 15. Module Introduction 16. When Signatures Fail - Detecting Custom Packers 17. Demo: Detecting Custom Packers 18. Using Sandboxes for Unpacking 19. Lab: Detecting Custom Packers 20. Conclusion 5. Performing Manual Unpacking 21. Module Introduction 22. Unpacking by Memory Analysis 23. Demo: Unpacking a Ransomware 24. Deeper Understanding of Packing Logic through Reverse Engineering 25. Demo: Unpacking a Simda 26. Demo: Tracing More Complex Unpacking Logic 27. Lab: Unpacking Custom Packers 28. Conclusion 6. Leveling up Your Skills 29. Module Introduction 30. What You Learned 31. Leveling up Your Skills 32. Conclusion Our members see more. Join us! ------------- Our members see more. Join us!