SecurityTrainings

Posts in category Presentations

Session 5: Reverse Engineering Automa...

Session 5: Reverse Engineering Automation (Scripts, plugins etc.)

This is one of the most important session. We highly recommend the use of tools and plugins we have discussed in this session. Check reference section for more information.    

Session 4: Anti-Analysis Techniques (...

Session 4: Anti-Analysis Techniques (Anti-debugging, Anti-VM etc.)

Anti-Analysis techniques are very common in malwares. Understanding of these techniques is very crucial otherwise it will be very difficult to analyse a piece of sample that use these techniques. Check the reference section for more information.    

Session 3: Botnet Analysis – Pa...

Session 3: Botnet Analysis – Part 2

This session will introduce some more advanced methods of analysis and detection. We highly recommend reading of these methods. Check the reference section for more information.    

Session 2: Botnet Analysis – Part 1

Session 2: Botnet Analysis – Part 1

This session will discuss some stealth techniques used by malwares, also demonstrate some rapid reversing techniques to accelerate the reversing tasks. Check reference section for more information.    

Session 1: Detection and Removal of M...

Session 1: Detection and Removal of Malwares

This session will introduce you with some tools and tricks to identify and remove malwares from the infected system. Check the reference section for more information.    

Session 12 – Case Study: Rootkit Anal...

Session 12 – Case Study: Rootkit Analysis

Rootkit is the next level in malwares. Rootkits mostly compromise the kernel side of the operating system. So they are some of the most sophisticated piece of codes you will see in malwares. Check the reference section for additional material. We highly recommend reading of “Rootkit Arsenal” book.    

Session 11 – Practical Reversing Part...

Session 11 – Practical Reversing Part VI – Exploit Development [advanced]

This session will discuss some protections added by the operating systems and processors to mitigate the exploitation, after that, also present some ways to bypass those protections.  

Session 10 – Practical Reversing Part...

Session 10 – Practical Reversing Part V – Exploit Development [basic]

Exploit is one of the most dangerous thing you will ever see in the history of computer science. It is a digital nuclear bomb. Now you can imagine how important is this session. This session will discuss some of the basic techniques of exploitation, some of these techniques may not work on latest operating system […]

Session 9 – Practical Reversing Part ...

Session 9 – Practical Reversing Part IV – Advanced Malware Analysis

This session will discuss some advanced techniques used by the malwares and cover some end to end techniques for malware analysis.  

Session 8 – Practical Reversing Part ...

Session 8 – Practical Reversing Part III – Malware Memory Forensics

Memory forensics is itself a complete domain in malware analysis. It is a process to identify the artefacts of malwares into the system after the infection. It is a branch of investigation and allow people to calculate the damage and risk of an malicious event. Check the reference section for additional material.