and though everyone And welcome to this introductory course about mobile Mauer analysis. I'm your instructor, Brian Rakowski, and today we'll be discussing Well, you guessed it mobile Mauer. Now this course, we also take a look at mobile device risks, mobile architectures analysis techniques, said mobile analysis tools on IOS and Android devices,
so that you could build a solid foundation of knowledge
of mobile malicious software.
Now, although we focus strictly a mole devices in this course the techniques used to apply to analyzing other types of Mauer. So if you have never done any mountain house before or simply just wish to learn about mobile techniques, this course will be perfect for you.
As I mentioned, my name is Brian Belski, and I wanted to take a minute just to briefly introduce myself to you. So I got started in cybersecurity over 10 years ago, working in the financial industry on very security teams. Now, while in this sector, I found the field of malware analysis very interesting to me and decided to take a malware analysis course
after I took the course and we didn't my resume.
I chose to move to D. C and work for some various government entities. After I moved to the defense industry, working as a Mauer analyst for A B E and Raytheon. And now, along with ex Capes and Cyber, eh? I'm an instructor, security researcher and author, writing various blog's and articles.
All right, now that you're familiar with me, I hope you're excited to get started. I know I am. So let's begin by looking over some objectives by the end of the course, you should be familiar with mobile devices and mobile device threats. Understand the different types of mobile architectures, learn mobile analysis techniques and tools.
Be able to analyze mobile malware while learning how to build your own analysis lab.
Next, let's talk about an important topic, which is the prerequisites now, I say important because during the course will be looking at IOS and Android malware, which means you'll need access to actual IOS and android hardware, but more on that in a moment.
So to be successful in the course, you're going to need knowledge and access to virtual technologies Now, although I used the M wear throughout the course, feel free to use virtual box or any other platform you feel comfortable with
you also should have access to OSX and Lex operating systems, familiarity with programming concepts and malware analysis. Now, although programming and malware analysis is listed here, it isn't such a heart requirement, saying that I will be touching on these topics throughout the course. But I won't be covering them with great depth. So just be aware of this before you continue
Now, probably the most important requirement listed here is access to IOS and OS X hardware
to before malware analysis on Apple products. There are opportunities to use virtual technologies, but they have severe limitations as the type of analysis you can perform.
Therefore, some access to a Mac computer and IOS devices are highly recommended. Then, without being said, there are resource is online that will allow you and help you run Mac OS on Windows. This project is called Macintosh, but we won't be covering that in this course.
Lastly, you'll need some time about four hours to be exact and access to the supplement of materials,
the supplement of materials for this course, are located on the Hex Capes website. There, you can access any downloads, source materials and all their blog's videos and articles, so be sure to check that out. You can also follow us on Twitter and order like us on Facebook if you like. If you aren't a social media fan, don't worry. You can always send us an e mail would be glad to hear from you.
All right, with all that being said before we completely dive into our analysis, I wanted to quickly let you know that throughout the course we make use of various operating systems in different links, distributions that contain various tools and effort to speed up your analysis process. Now, although the process of building your own lab is a great exercise and is covered a bit later,
of course, matter analysis. So the faster I can get you looking at different samples and using different tools, the better position you'll be in when you go and build your own lab down the road. Lastly, I also try to include various samples resource is and tools so that if you aren't able to find a suitable piece of IOS hardware
or don't have access to a Mac,
you can still fall along and complete all the labs and exercises.
Okay, let's take a look at our course road man. The course itself is divided into five modules in the first module. We're gonna look at the mobile threat landscape, identify some threats, interest to mumbles devices, then devote some time to understanding Apple and Android architecture
in module to we look at some basic static analysis techniques for both mobile architectures, as well as dive into analysis tools and malware analysis methodologies. Next, we look at dynamic analysis techniques, then walk you through building your analysis lab and finally give you some malware analysis challenges that you can work through on your own.