Search

Search

Malware analysis 101

Malware analysis 101

Main Speaker:

Tracks:

After Event Workshops
Cyber

Seminar Catgories:

After Event
Cyber

Seminar ID:

42193

Date:

25.11.2019

Time:

Daily seminar
9:00-16:30

Location:

Jonn Bryce ECO Tower

Add to Calendar 25.11.2019 09:00 25.11.2019 16:30 Asia/Jerusalem Malware analysis 101

The hacking world has taken some major steps during the last couple of years, both in domains and in techniques.
This quick hands on seminar will give you a high level experience of some of the new and most exciting hacking techniques.
We’ll demonstrate Web based attacks, some more client related attacks and some infrastructure related ones.
The aim of this seminar is not to make you a hacker, rather to show, first hand, how easy it is today to execute advanced hacking techniques.
Relevant audience for this seminar are people with at least a couple of years hands-on experience in system and networking.
Experience with pentesting would help a lot though its not a must.

Overview

The hacking world has taken some major steps during the last couple of years, both in domains and in techniques.
This quick hands on seminar will give you a high level experience of some of the new and most exciting hacking techniques.
We’ll demonstrate Web based attacks, some more client related attacks and some infrastructure related ones.
The aim of this seminar is not to make you a hacker, rather to show, first hand, how easy it is today to execute advanced hacking techniques.
Relevant audience for this seminar are people with at least a couple of years hands-on experience in system and networking.
Experience with pentesting would help a lot though its not a must.

Who Should Attend

  • IT Manager
  • SOC Analysts
  • Research Groups

Prerequisites

  • Windows operating system

Course Contents

Basic Analysis

  • Malware Analysis Primer
    • Goals of Malware Analysis
    • Incident Response Role
    • Anti-Virus Signatures
    • Types of Malware and Definitions
  • Malware Extraction
    • Receive it as a PCAP file
    • Receive it as a Memory
  • Basic Static Techniques
    • Digital Signatures
    • Anti-virus Scanning
    • PE file
    • Strings, Functions and Headers
    • DLL Linking Methods
    • Packed Malware
  • Basic Dynamic Analysis
    • Configuring Sandbox for Examine
    • Process Monitor
    • Process Explorer
    • Creating Fake Networking
    • Registry Analysis


Contact