SecurityTrainings

Posts in category Reverse Engineering

Student Mentorship Programme Applicat...

Student Mentorship Programme Application Form [2014-2015]

Application Form for session 2014-2015 is online now.     To apply to this Mentorship Programme, aspiring students have to fill Mentorship Programme Application form. Please download the form here   Application form is divided into two parts Basic Information Screening Questions   #1 Basic Information – In this section students have to fill their […]

Call For Sessions – SecurityXpl...

Call For Sessions – SecurityXploded Meet – Bangalore, India!

This is call for sessions for “SecurityXploded Meet” on 21st June 2014 in Bangalore. As you may already know that we have announced a quarterly dedicated system security meet (http://goo.gl/JQaBPy). The focus of the meet is to discuss analysis and innovations around the system security area and to interact with the like minded people to […]

Session 5: Reverse Engineering Automa...

Session 5: Reverse Engineering Automation (Scripts, plugins etc.)

This is one of the most important session. We highly recommend the use of tools and plugins we have discussed in this session. Check reference section for more information.    

Session 3: Botnet Analysis – Pa...

Session 3: Botnet Analysis – Part 2

This session will introduce some more advanced methods of analysis and detection. We highly recommend reading of these methods. Check the reference section for more information.    

Session 11 – Practical Reversing Part...

Session 11 – Practical Reversing Part VI – Exploit Development [advanced]

This session will discuss some protections added by the operating systems and processors to mitigate the exploitation, after that, also present some ways to bypass those protections.  

Session 10 – Practical Reversing Part...

Session 10 – Practical Reversing Part V – Exploit Development [basic]

Exploit is one of the most dangerous thing you will ever see in the history of computer science. It is a digital nuclear bomb. Now you can imagine how important is this session. This session will discuss some of the basic techniques of exploitation, some of these techniques may not work on latest operating system […]

Session 8 – Practical Reversing Part ...

Session 8 – Practical Reversing Part III – Malware Memory Forensics

Memory forensics is itself a complete domain in malware analysis. It is a process to identify the artefacts of malwares into the system after the infection. It is a branch of investigation and allow people to calculate the damage and risk of an malicious event. Check the reference section for additional material.

Session 7 – Practical ReversingPart I...

Session 7 – Practical ReversingPart II – Unpacking Malware

In reverse engineering understanding cryptographic functions and packers are the two most challenging and sophisticated tasks. In real life virtually all malwares use some form of packing so understanding packing/unpacking is one of the most important task in malware analysis. Check the reference section for additional material. We highly recommend Lena151 (see reference) material for […]

Session 6 – Practical Reversing Part ...

Session 6 – Practical Reversing Part I – Malware Analysis

This session will introduce you with our first practical reversing class. If you are completely new to reverse engineering then mark this session as your reference. Understand each word of this session and explore them offline. Check the reference section for additional material.   <

Session 5 – Reverse Engineering Basic...

Session 5 – Reverse Engineering Basics and Tool Guide

Some tools like ollydbg, IDA pro etc. are little bit complex and may not make much sense at first. The most important part in reverse engineering is to deeply understand your tools. The 50% of success depends on the tools and rest is on your knowledge and experience. Check the help files (for example: ollydbg […]