3 hours 41 minutes
Okay, everyone, let's wrap up our Mauer Obstacles module with a brief summary
in the Malware Challenges module, we review different ways that malware can hinder our analysis.
First we looked at Packers. We reviewed the different types of packers, how they work, and we looked at different ways to examine our binaries to see if a Packer has been implemented.
Then we looked at different types of obfuscation techniques that now where authors like to employ to hide their Mauer's true intent.
In these sessions, we looked at how X or base 64 encryption works,
how to recognize these constructs and how they're implemented. Finally, we reviewed a number of different ways that malware can detect if our lab is in a virtual environment.
We also examined how network can employ anti debugging and anti disassembly techniques in an effort to thwart analysis.
Okay, so now that we've looked at overcoming some Mauer obstacles in our next module module five, we're going to look at how to perform our memory. Forensics