Table of Content
Malware Analysis Basics and Lab Setup
- What Is Malware and the Need for Malware Analysis
- Types of Malware
- Malware Analysis Methodology
- How to Set Up Your Lab?
- Why a Snapshot Is Useful?
- Some Warnings
Dynamic Malware Analysis
- Why Dynamic Analysis?
- Monitoring System Processes
- Analyzing Network Traffic
- Detecting Local Changes
- What Is a Debugger?
- Basic Features of OllyDbg
- Malware Analysis Using OllyDbg
Static Malware Analysis
- Why Static Analysis?
- x86 Instruction Set
- Introduction to File Formats
- Extracting Useful Information from Malware Binary
- Finding Imports and Linked Files
- How a Disassembler Can Help Us?
- Basic Features of IDA Pro
- Malware Analysis Using IDA Pro
Malware Evasion Techniques
- Anti-Debugging
- Anti-Disassembly
- Anti-Virtual Machines
- Data Encoding
- Polymorphism
- More Evasion Techniques
Malware Functionalities
- Backdoors
- Keyloggers and Information Stealers
- Downloaders
- Ransomware
- Rootkits
Malware Advanced Techniques
- Privilege Escalation
- Persistence Methods
- Data Encoding
- Covert Launching Techniques
Advanced Dynamic Malware Analysis
- Using a Debugger
- An Overview of the Windows Environment
- User Mode Debugging
- Malware Analysis Using OllyDbg
- Features of OllyDbg
- Kernel Mode Debugging
- Malware Analysis Using WINDBG
- Features of WINDBG
Advanced Static Malware Analysis
- Advanced Notes on the x86 Architecture
- How a Disassembler Can Help Us
- Loading and Navigating Using IDA Pro
- Functions in IDA
- IDA Pro Graphic Features
- Analysing Malware Using IDA Pro
Malware Detection and Defence
- Malware Detection Techniques
- Steps to Clean a Compromised Network
- How Intrusion Detection Systems Work
- An Introduction to Snort
- How to Setup Snort?
Evasive Malware
- How Do Packers Work?
- How to Detect Packed Malware?
- How to Unpack a Malware Program?
- Examples of Unpacking a Malware Program
Apply for certification
https://www.vskills.in/certification/security/malware-analysis