تقييم الموضوع :
  • 0 أصوات - بمعدل 0
  • 1
  • 2
  • 3
  • 4
  • 5
Reverse Engineering Ransomware
#1
[صورة مرفقة: 006aebc0-medium.jpg]
 
Static and dynamic analysis. Reverse engineering. Writing Decryptors

What you'll learn
The lectures, videos and other resources will provide relevant information about current malware analysis tricks
How to use disassemblers and other security tools
How to identify flaws in ransomware code or encryption logic
Practice on progressively difficult samples which illustrate different concepts each
Practice acquired knowledge via quizzes for each section
How to write simple decrpytors in a high-level language (source code provided)

Requirements
Basic programming knowledge
A computer that can run a Windows virtual machine.
An interest in disassembling things and understanding how they work!
Patience and perseverance to “try harder”

Description
The aim of this course is to provide a practical approach to analysing ransomware. Working with real world samples of increasing difficulty, we will
Deep dive into identifying the encryption techniques
Navigate through various evasion tricks used by malware writers
Have fun discovering flaws in their logic or the implementation and finally
Working out automated ways to recover the affected files

:Who this course is for
Security testers
Malware analysts
Forensics investigators
System administrators
Information security students
Anyone interested in ransomware and malware analysis


الملفات المرفقة
.txt   Reverse Engineering Ransomware.txt (الحجم : 184 bytes / التحميلات : 32)
أعضاء أعجبوا بهذه المشاركة : TeRcO


التنقل السريع :


يقوم بقرائة الموضوع: بالاضافة الى ( 1 ) ضيف كريم