Make Contact If You Get Any Issue - Whatsapp - +91 - 7988285508
Malware behavior based on its class
Advanced dynamic and static malware analysis
Gain experience in working with OllyDbg, WINDBG, and IDA Pro
Detect and defend against malware
Master how packers and unpackers work
In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on its characteristic. We see how sophisticated malware can use techniques to either evade detection or increase its damage and access to the system.
Then we learn advanced techniques in static and dynamic malware analysis and cover the details and powerful features of OllyDbg, IDA Pro, and WINDBG. We also explore defense mechanisms against malware, create a signature for malware, and set up an intrusion detection system (IDS) to prevent attacks.
Finally, we cover the concept of packers and unpackers, and explore how to unpack packed malware to analyze it.
The code bundle for this video course is available at- https://github.com/PacktPublishing/-Advanced-Malware-Analysis
Style and Approach
Through this course, complicated concepts in malware analysis are explained in simple language so that everyone can understand the fundamental concepts; this is enhanced by many examples of using tools to analyze malware manually and automatically.
Master advanced malware analysis topics
Hands-on experience with popular analysis tools
Covers advanced topics on malware behavior and evasion
Exploring Malware Functionalities
Keyloggers and Information Stealers
2 Malware Advanced Techniques
Covert Launching Techniques
3 Advanced Dynamic Malware Analysis
An Overview of the Windows Environment
User Mode Debugging
IDA Pro Graphic Features
Malware Analysis Using OllyDbg
Features of OllyDbg
Kernel Mode Debugging
Malware Analysis Using WINDBG
Features of WINDBG
4 Advanced Static Malware Analysis
How a Disassembler Can Help Us
Loading and Navigating Using IDA Pro
Functions in IDA
Analysing Malware Using IDA Pro
5 How to Detect and Defend against Malware in a Network
Steps to Clean a Compromised Network
How Intrusion Detection Systems Work
An Introduction to Snort
How to Setup Snort?
6 How to Deal with Evasive Malware
How to Detect Packed Malware?
How to Unpack a Malware Program?
Examples of Unpacking a Malware Program