Malware Analysis / Reverse Engineering Notes

Dynamic Malware Analysis 1.1

Dynamic Malware analysis: – Execute the malware: run the code in a virtual machine Problems: some code doesn’t get executed as we don’t have the specific environment or the conditions are not met, don’t have required software [view]

By: munjal | Related Lesson: Dynamic Analysis Part 1.1 | Modified: February 25, 2018

Dynamic Analysis Part 2

Github for malware downloads [view]

By: bmesser513 | Related Lesson: Dynamic Analysis Part 1.2 | Modified: January 27, 2018

Dynamic MA Part One

Execute the Malware First response Generate indicators of compromise Determine malware type/family Assess risk and Impact Attribution [view]

By: bmesser513 | Related Lesson: Dynamic Analysis Part 1.1 | Modified: January 27, 2018

later

pe format    mem address space 8086   [view]

By: deepakmeena635 | Related Lesson: Basic Static Analysis Part 2 | Modified: January 27, 2018

lab setup 3

some malware do know the vmware environment and can act differently and start its defensive mechanisms.  changing mac address will help malware also checks what is the ip address of the machine its running on by sending lookup packets to internet. B [view]

By: bakir malik | Related Lesson: Lab Setup Part 3 | Modified: January 26, 2018

Lab Setup Part 1

VMware or VirtualBox [view]

By: bmesser513 | Related Lesson: Lab Setup Part 1 | Modified: January 25, 2018

Malware Introduction

70-90% des samples malwares sont développés pour une organisation (Verizon Data Breach Report 2015)   [view]

By: cyberkaser | Related Lesson: Intro Part 1 | Modified: January 25, 2018

Malware Introduction

70-90% des samples malwares sont développés pour une organisation (Verizon Data Breach Report 2015) Types of Analysis : Analyse Dynamic – executing the malware. Simple, fast. Easy to miss things Analyse Static – reverse engineering. Slo [view]

By: cyberkaser | Related Lesson: Intro Part 1 | Modified: January 25, 2018

Malware

http://Malshare.com/ – F contagio malware dump – F&R kernelmode.info – F& R malware.lu’s Avcaesar – F& R MalwareBlacklist – F & R Malware_DB – F Malwr -F & R Open Malware- F SecuBoxLabs &# [view]

By: venkatesh0919 | Related Lesson: Dynamic Analysis Part 1.3 | Modified: January 25, 2018

malware samples

contagio, kernelmode.info, malshare, malware.Iu’s avcaesar, malwareblacklist, malware_DB, malwr, open malware, secubox labs, mirus share..  [view]

By: mundy007 | Related Lesson: Intro Part 3 | Modified: January 24, 2018

« First ‹ Previous 1 9 10 11 12 13 21 89 Next › Last »

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel