Fundamentals of Malware Analysis

Fundamentals of Malware Analysis

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 2h 10m | 359 MB

Explore the basic concepts of malware and get familiar with various types of malware analysis tools and techniques

In this video course, we start with the basic concepts of malware and you’ll get familiar with the different types of malware and the malware analysis process. Before moving on with the techniques of malware analysis, you’ll see how to set up your own lab to make a secure environment for malware analysis.

Moving on, you’ll get familiar with the basic techniques of static and dynamic malware analysis and gets your hands dirty with debuggers and disassemblers such as OllyDbg and IDA PRO. You’ll learn how to analyze malware and understand its anatomy using these tools and techniques. Finally, you’ll be exposed to the techniques that malware may use to evade detection and remain undetected.

By the end of the course, you’ll have a solid knowledge that will enable you to analyze the majority of malware programs.

The code bundle for this video course is available at – github.com/PacktPublishing/Fundamentals-of-Malware-Analysis

In this tutorial, we explain complicated concepts in malware analysis but in simple language that everyone can understand. We show you the fundamental concepts and augment them with many examples of using tools to analyze malware manually and automatically.

What You Will Learn

  • Study malware behavior based on its class
  • Gather advanced dynamic and static malware analysis
  • Gain experience in working with OllyDbg, WINDBG, and IDA Pro
  • Know how to detect and defend against malware
  • See how packers and unpackers work
Table of Contents

01 The Course Overview
02 What Is Malware and the Need for Malware Analysis
03 Types of Malware
04 Malware Analysis Methodology
05 How to Set Up Your Lab
06 Why a Snapshot Is Useful
07 Some Warnings
08 Why Dynamic Analysis
09 Monitoring System Processes
10 Analyzing Network Traffic
11 Detecting Local Changes
12 What Is a Debugger
13 Basic Features of OllyDbg
14 Malware Analysis Using OllyDbg
15 Why Static Analysis
16 x86 Instruction Set
17 Introduction to File Formats
18 Extracting Useful Information from Malware Binary
19 Finding Imports and Linked Files
20 How a Disassembler Can Help Us
21 Basic Features of IDA Pro
22 Malware Analysis Using IDA Pro
23 Anti-Debugging
24 Anti-Disassembly
25 Anti-Virtual Machines
26 Data Encoding
27 Polymorphism
28 More Evasion Techniques