Time
9 hours 10 minutes
Difficulty
Advanced
CEU/CPE
9

Video Description

Welcome to Packers Part 4. In this module, we'll demonstrate an example to unpack a malware code. We'll use UPX Packed Regshot and take a look at the strings, before and after the packing. We'll also explain how to manually unpack UPX, dump the process, and reconstruct the Import Address Table (IAT).

Up Next

Intro to Malware Analysis and Reverse Engineering

In this course you will learn how to perform dynamic and static analysis on all major files types, how to carve malicious executables from documents and how to recognize common malware tactics and debug and disassemble malicious binaries.

Instructed By

Instructor Profile Image
Sean Pierce
Instructor