Module 4 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
3 hours 41 minutes
Difficulty
Advanced
CEU/CPE
5
Video Transcription
00:00
Okay, everyone, let's wrap up our Mauer Obstacles module with a brief summary
00:07
in the Malware Challenges module, we review different ways that malware can hinder our analysis.
00:13
First we looked at Packers. We reviewed the different types of packers, how they work, and we looked at different ways to examine our binaries to see if a Packer has been implemented.
00:25
Then we looked at different types of obfuscation techniques that now where authors like to employ to hide their Mauer's true intent.
00:34
In these sessions, we looked at how X or base 64 encryption works,
00:39
how to recognize these constructs and how they're implemented. Finally, we reviewed a number of different ways that malware can detect if our lab is in a virtual environment.
00:48
We also examined how network can employ anti debugging and anti disassembly techniques in an effort to thwart analysis.
00:58
Okay, so now that we've looked at overcoming some Mauer obstacles in our next module module five, we're going to look at how to perform our memory. Forensics
Up Next