9 hours 10 minutes

Video Description

In this module, we'll cover some basic malware tricks using the reverse engineering technique. As many of you might know that malware uses certain tricks to confuse, make analysis more difficult, or even break the disassembler. We'll demonstrate stack analysis of a malware to understand the malware and its attribution, identify Indicators of Compromise (IOCs), confirm our dynamic analysis results, and discover the anti-debugging code.

Up Next

Intro to Malware Analysis and Reverse Engineering

In this course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries.

Instructed By

Instructor Profile Image
Sean Pierce