PLU | Malware Analysis: Identifying And Defeating Packing (2019 EN)

Discussion in 'Information Technology' started by Kanka, Nov 25, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,086
    Likes Received:
    446
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Josh Stroschein
    Full Title: Malware Analysis: Identifying And Defeating Packing
    Year: 2019
    Language: English
    Genre: Educational: Security
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 02:17:25
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 150 kbps
    Audio: AAC at 93 Kbps, 2 channels, 44.1 KHz



    Malware authors routinely utilize packing techniques to complicate the analysis of their code. This course will teach you techniques for identifying and defeating packing so that key characteristics and behaviors can be identified.

    Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. One such technique is packing, in which a malicious program is layered inside another program. In Malware Analysis: Identifying and Defeating Packing, you will gain the skills necessary to not only identify prevalent packing techniques, but also how to effectively defeat them. First, you will learn how packers work and how malware authors regularly use them. Next, you will learn how to detect common packers and methods for unpacking. Finally, you will learn about custom packers, how you can identify them and effective ways for defeating them. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware packing techniques with such tools as IDA Pro and WinDbg, by the end of this course you will have the knowledge and skills to effectively tackle packing!


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Why Packing Affects Your Analysis
    02. Course Introduction
    03. Why Malware Authors Pack Code
    04. Module Introduction
    05. Common Packing Scenarios
    06. What You Should Know
    07. Conclusion
    3. How Packers Work
    08. Module Introduction
    09. Detecting Signs of Packing
    10. Demo: Packikng a "Hello World"
    11. Detecting Packers with Signatures
    12. Demo: Packer Detection with Tools
    13. Lab: Identification and Unpacking
    14. Conclusion
    4. Identifying Custom Packers
    15. Module Introduction
    16. When Signatures Fail - Detecting Custom Packers
    17. Demo: Detecting Custom Packers
    18. Using Sandboxes for Unpacking
    19. Lab: Detecting Custom Packers
    20. Conclusion
    5. Performing Manual Unpacking
    21. Module Introduction
    22. Unpacking by Memory Analysis
    23. Demo: Unpacking a Ransomware
    24. Deeper Understanding of Packing Logic through Reverse Engineering
    25. Demo: Unpacking a Simda
    26. Demo: Tracing More Complex Unpacking Logic
    27. Lab: Unpacking Custom Packers
    28. Conclusion
    6. Leveling up Your Skills
    29. Module Introduction
    30. What You Learned
    31. Leveling up Your Skills
    32. Conclusion


    -------------
     
    vishia and tahooo like this.