In this module, we'll understand more on packers. We'll demonstrate the visual changes in a malware code when a packer has been included versus the one with no packer. We'll use Cantor Dust to display the visual changes.
Intro to Malware Analysis and Reverse Engineering
In this course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries.