Module 3 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
3 hours 41 minutes
Difficulty
Advanced
CEU/CPE
5
Video Transcription
00:00
Okay, so let's wrap up our dynamic analysis and static analysis module with a brief summary
00:07
in the dynamic and static analysis module, we reviewed the steps of the dynamic analysis process and ran malware in our lab to observe, collect and report on the changes that malware will make to our target system.
00:22
While working in our lab, we also reviewed the required set of tools to effectively collect malware artifacts.
00:29
Also, during dynamic analysis, we learned how to load malware into a do bugger so that while it's running, we could pause, modify, observe and control malware execution.
00:41
Next, we reviewed the code analysis process by loading execute a bles into the Ida pro dis assembler.
00:48
During this time, we reviewed its interface. We navigated through assembly code and we looked at it's graphing functions.
00:55
Then we reviewed the disassembly of well known code constructs so that you could easily recognize them as you are. Reverse engineering malware.
01:04
All right, everyone. So that wraps up our analysis module in Module four will be exploring and overcoming Mauer challenges such as packers obfuscation, as well as looking at malware with anti analysis features
Up Next