9 hours 10 minutes

Video Description

In the first module, you'll understand how to setup a malware analysis lab. You'll learn about the various components that are involved in a typical lab setup. We'll explore a basic lab setup, involving running a local VM on a Windows local machine (referred to as the victim) and funnelling traffic through a Linux VM (called the Router). This module begins with the installations of VMware workstation, Windows XP, and finally, setup of Kali for networking.

Video Transcription

welcome to slavery. My name is Sean Pierce, and I'm a subject matter expert for malware analysis. Today, we'll be discussing module two,
where we set up, um, our analysis lab.
So the industry standard set up is that you run a local V M on your local machine and there is a victim,
usually with his ex P Windows machine. And then there's some kind of route or a linear SVM, typically where you can funnel the traffic through it out to the Internet if you need to.
So here's our basic setup, where today I will show you how to install
Veum Wear workstation,
and we will install Windows X, P and then install
Callie Lennox says our router. And then we'll set up the networking so that when his ex p will funnel is traffic to Callie.
So this basic setup, like I said in balls vm where. But you can also use virtual box from Oracle, which is free and open source. You can also use Veum where player that's free and it'll you console a virtual machine and you can
executed, but you cannot snapshot with it, and I think snapshot on is very essential to what we're doing because, well,
set up a machine with our tools at the ready and then execute the malware, and we'd like to reset it so we can run it over and over and over again. So I highly suggest using you the virtual box or being more work station, uh, the industry standard SVM where? So
we're gonna install or being where tools were gonna install
our analysis tools on. Then we're gonna set Callie, and we're gonna soul being more tools on that.

Up Next

Intro to Malware Analysis and Reverse Engineering

In this course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries.

Instructed By

Instructor Profile Image
Sean Pierce