3 hours 41 minutes
in the malware Analysis Redux course, we covered various components of the malware analysis and reverse engineering process
in Module one. We reviewed the Now we're analysis process. We summarized reverse engineering tools, and we looked at various file formats and Windows OS components.
After in module to we examined the X 64 X 86 architectures.
We reviewed how to convert numbers between bases,
examined the X m bling language in depth,
the program compilation process as well as explored debugging tools. In Module three, we reviewed the dynamic and static analysis process. We perform dynamic and static analysis in our labs, and we learned how to extract. Now we're artifacts utilizing static analysis, dynamic analysis, tools and techniques on militias. Binaries.
Then, in Module four, we explored. Now we're analysis challenges. We looked at Packer Theory, looked at various ways to obfuscate data, explored encryption and looked at various anti virtual machine, anti debugging and anti reverse engineering techniques.
Finally, a module five, we learned about the memory forensics process, how to acquire memory and analyze memory images from target systems.
We also learned how to use volatility and its various plug ins to extract information and Mauer artifacts from our dumped memory image.
Finally, I wanted to close up the course with a really big thank you.
I really hope you enjoy the course. Thanks so much for joining me. If you have any questions or comments, please send me an email. And be sure to check out all the great content at X games dot com or cyber. Very good day. Good luck and be safe.