9 hours 10 minutes

Video Description

In this module, we'll discuss and enumerate the capabilities of IllusionBot that we've used during this course. We'll demonstrate how to find commanding processing subroutines or the configuration processing subroutines. Important tip to remember is to document everything while reverse engineering and test the software using dynamic analysis. You can read the following resources to learn more:

  • The IDA Pro Book: The Unofficial Guide by Chris Eagle
  • Professional Assembly Language by Richard Blum
  • Reversing: Secrets of Reverse Engineering by Eldad Eilam
  • Corkami

Up Next

Intro to Malware Analysis and Reverse Engineering

In this course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries.

Instructed By

Instructor Profile Image
Sean Pierce