Module 4 Summary
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Okay, everyone, let's wrap up our Mauer Obstacles module with a brief summary
00:07
in the Malware Challenges module, we review different ways that malware can hinder our analysis.
00:13
First we looked at Packers. We reviewed the different types of packers, how they work, and we looked at different ways to examine our binaries to see if a Packer has been implemented.
00:25
Then we looked at different types of obfuscation techniques that now where authors like to employ to hide their Mauer's true intent.
00:34
In these sessions, we looked at how X or base 64 encryption works,
00:39
how to recognize these constructs and how they're implemented. Finally, we reviewed a number of different ways that malware can detect if our lab is in a virtual environment.
00:48
We also examined how network can employ anti debugging and anti disassembly techniques in an effort to thwart analysis.
00:58
Okay, so now that we've looked at overcoming some Mauer obstacles in our next module module five, we're going to look at how to perform our memory. Forensics
Up Next
Instructed By
Similar Content