Module 4 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
3 hours 41 minutes
Difficulty
Advanced
CEU/CPE
5
Video Transcription
00:00
Okay, everyone, let's wrap up our Mauer Obstacles module with a brief summary
00:07
in the Malware Challenges module, we review different ways that malware can hinder our analysis.
00:13
First we looked at Packers. We reviewed the different types of packers, how they work, and we looked at different ways to examine our binaries to see if a Packer has been implemented.
00:25
Then we looked at different types of obfuscation techniques that now where authors like to employ to hide their Mauer's true intent.
00:34
In these sessions, we looked at how X or base 64 encryption works,
00:39
how to recognize these constructs and how they're implemented. Finally, we reviewed a number of different ways that malware can detect if our lab is in a virtual environment.
00:48
We also examined how network can employ anti debugging and anti disassembly techniques in an effort to thwart analysis.
00:58
Okay, so now that we've looked at overcoming some Mauer obstacles in our next module module five, we're going to look at how to perform our memory. Forensics
Up Next
Advanced Malware Analysis: Redux

In this course, we introduce new techniques to help speed up analysis and transition students from malware analyst to reverse engineer. We skip the malware analysis lab set up and put participants hands on with malware analysis.

Instructed By