Reverse Engineering & Malware Analysis - Intermediate Level

An Intermediate Level Course on Reverse Engineering and Analyzing Malware

4.44 (298 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
Reverse Engineering & Malware Analysis - Intermediate Level
12 289
students
5.5 hours
content
Dec 2024
last update
$74.99
regular price

What you will learn

Types of Malware and Terminologies

Static Analysis

Dynamic Analysis

Assembly Language Refresher and Malicious APIs

API Hooking, Process Hijacking, Dumping Memory

Identifying Standard and Custom Packers

Unpacking Packed Malware

Enumerating Breakpoints and Memory Tracing

Hooking VirtualProtect, VirtualAlloc, GetProcAddress, CreateProcessInternalW and other common API's

Using Scylla Plugin to Dump Memory, Fixing IAT Tables

Using Delphi Interactive Reconstructor

Dumping Memory from Memory Viewer, Process Hacker and Memory Maps

API Enumeration Count Trick To Know When to Dump

Self-Injection and Remote Thread Injection

Fixing Section Alignments, Unmapping and Re-Basing Dumped Files

and more...

Why take this course?

🎉 Intermediate Mastery of Reverse Engineering & Malware Analysis 🛠️👩‍💻


Course Headline: Unlock the Secrets of Malware with Intermediate Reverse Engineering

Are you ready to delve deeper into the world of reverse engineering and malware analysis? If you've already dipped your toes into the basics and are eager for more, this Intermediate Level Course on Reverse Engineering and Analyzing Malware is tailored just for you! 🕵️‍♂️✨


Course Description:

Welcome to an immersive journey where theory takes a backseat to hands-on experience. This course is designed for individuals who possess foundational knowledge in reverse engineering and malware analysis and are now looking to elevate their skills to the next level. Paul Chincourse, your experienced instructor, will guide you through this practical adventure, ensuring that by the end, you'll have a solid intermediate-level understanding of malware analysis.

What can you expect from this course? 🔍

  • Highly Practical Approach: We believe in learning by doing. No time will be wasted on dry lectures; instead, you'll engage in walk-throughs that you can replicate, enhancing your understanding and application of reverse engineering techniques.
  • Focus on Unpacking Malware: With modern malware often packed to thwart analysis, this course equips you with the essential tools and knowledge required to unpack it effectively.
  • API Hooking & Memory Analysis: Learn how to trace and analyze malicious activities in memory, determining the optimal times to capture valuable data.
  • Using Oracle Virtual Machine with Flare-VM: This course leverages a set of free software tools for your analysis.

Topics Covered:

  • Types of Malware and Terminologies: Understanding the malware landscape.
  • Dynamic & Static Analysis: Master both approaches to analyze malware comprehensively.
  • Assembly Language Refresher: Get up to speed with malicious APIs.
  • API Hooking, Process Hijacking: Learn how to uncover and manipulate these techniques.
  • Dumping Memory: Master when and how to capture memory effectively.
  • Fixing Section Alignments: Ensure the integrity of your memory dumps.
  • Enumerating Breakpoints & Memory Tracing: Techniques to follow malware execution paths.
  • Hooking Key APIs (VirtualProtect, VirtualAlloc, GetProcAddress, CreateProcessInternalW): Understand and utilize these crucial APIs in your analysis.
  • Scylla Plugin for Dumping Memory: Discover powerful tools at your disposal.
  • Delphi Interactive Reconstructor: Learn to use this tool to reconstruct software.
  • Memory Maps & Dumping from Viewers (Memory Viewer, Process Hacker): Analyze and interpret memory dumps effectively.
  • API Enumeration Count Trick: Learn the timing for memory dumping.
  • Self-Injection & Remote Thread Injection: Techniques to execute code in a process's memory context.

Suitable for:

  • Students who have completed a basic level malware analysis course.
  • Hackers looking to expand their toolkit and techniques for reverse software.
  • Reverse Engineers aiming to branch out into malware analysis.

Prerequisites:

  • Some basics in malware analysis or software reverse engineering.
  • A Windows PC with Virtual Machine (VirtualBox, VMWare) and Flare-VM installed. The software used throughout this course is 100% free!

Special Note:

If you're new to the field of malware analysis or reverse engineering, I highly recommend starting with my earlier course titled: “Reverse Engineering & Malware Analysis Fundamentals”. It will provide you with a strong foundation needed for this intermediate-level course. 🚀


Don't wait any longer to enhance your skills and deepen your understanding of reverse engineering and malware analysis. Enroll now and join me on this enlightening journey! I can't wait to see you inside the course, where together we'll crack the code of complex malware. 💫🚀


Ready to take the next step? Click 'Enroll Now' and let's embark on this exciting learning path together!

Screenshots

Reverse Engineering & Malware Analysis - Intermediate Level - Screenshot_01Reverse Engineering & Malware Analysis - Intermediate Level - Screenshot_02Reverse Engineering & Malware Analysis - Intermediate Level - Screenshot_03Reverse Engineering & Malware Analysis - Intermediate Level - Screenshot_04

Our review

🌟 Global Course Rating: 4.70

Course Review

Pros

  • Practical and Hands-On Learning: The course is praised for its practical approach, providing real-world skills in malware unpacking and analysis that can be applied to securing companies.

  • Clear Explanations: Professor Paul Chin's ability to clearly define concepts is highly appreciated, making the course suitable for those with a base in reverse engineering and malware analysis.

  • Responsive Instructor: The instructor, Prof. Chin, is quick to respond to any questions students may have about the course content.

  • Comprehensive Content: The course covers a wide range of examples on how to unpack packed malware, which helps in understanding the most common API calls used by packers.

  • Highly Recommended: The course is recommended, with many learners emphasizing the value of taking both the fundamental and intermediate courses offered by Prof. Chin.

  • Informative for Debugging: The course provides informative content on debugging malware and offers a variety of samples to work with, including suggestions for additional samples like Cobalt Strike.

  • Great Training in Debugging: Learners report that they gained valuable skills in working with a debugger and learned "cool tricks" and processes involved in unpacking malware samples.

  • Continuity with Previous Courses: The course is designed to build upon the knowledge from previous courses, which helps in revising and improving techniques.

Cons

  • Outdated OS Requirement: Some learners encountered issues with outdated operating systems, such as Windows 7, where certain breakpoints did not hit as expected due to OS updates like Flare-VM no longer being supported for Windows 7.

  • API Logging and Emulation Missing: A few learners felt that the course could have benefited from an introduction to API logging and emulation before starting debugging, which would help in determining more suitable API calls for breaking and reaching the unpacked code faster.

  • Windows 10 Compatibility: There are reported compatibility issues with Windows 10 where some breakpoints do not work as they should with the newer OS. This should be addressed in the prerequisites or within the course content.

  • Desire for More Theory: Some learners expressed a desire for more theoretical explanation or further details on certain techniques, such as finding the Original Entry Point (OEP) and other unpacking techniques.

Additional Notes

  • It is recommended that students ensure they are using the correct operating system version and virtual machine setup before starting the course to avoid compatibility issues.

  • The course's theoretical aspects could be expanded upon, providing a more holistic learning experience.

Overall, the course is highly regarded for its practical approach to malware unpacking and analysis. With some attention to updates in operating systems and a bit more detail on foundational techniques, this course stands out as an excellent resource for security professionals looking to enhance their skills.

4108556
udemy ID
08/06/2021
course created date
22/07/2021
course indexed date
Bot
course submited by