In this module, we'll cover some basic malware tricks and dive deeper into the string obfuscation concept. You'll learn both the easy as well as the hard way for string obfuscation. The hard way includes fully reverse engineering the code, re-implementing it, and then applying the same process to the strings. While the easy way uses the native code and executes it. We'll demonstrate a hybrid method, combining both static as well as dynamic analysis for de-obfuscation of strings.
Intro to Malware Analysis and Reverse Engineering
In this course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries.