Module 3 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

3 hours 41 minutes
Video Transcription
Okay, so let's wrap up our dynamic analysis and static analysis module with a brief summary
in the dynamic and static analysis module, we reviewed the steps of the dynamic analysis process and ran malware in our lab to observe, collect and report on the changes that malware will make to our target system.
While working in our lab, we also reviewed the required set of tools to effectively collect malware artifacts.
Also, during dynamic analysis, we learned how to load malware into a do bugger so that while it's running, we could pause, modify, observe and control malware execution.
Next, we reviewed the code analysis process by loading execute a bles into the Ida pro dis assembler.
During this time, we reviewed its interface. We navigated through assembly code and we looked at it's graphing functions.
Then we reviewed the disassembly of well known code constructs so that you could easily recognize them as you are. Reverse engineering malware.
All right, everyone. So that wraps up our analysis module in Module four will be exploring and overcoming Mauer challenges such as packers obfuscation, as well as looking at malware with anti analysis features
Up Next
Advanced Malware Analysis: Redux

In this course, we introduce new techniques to help speed up analysis and transition students from malware analyst to reverse engineer. We skip the malware analysis lab set up and put participants hands on with malware analysis.

Instructed By