Rootkit is the next level in malwares. Rootkits mostly compromise the kernel side of the operating system. So they are some of the most sophisticated piece of codes you will see in malwares. Check the reference section for additional material. We highly recommend reading of “Rootkit Arsenal” book.
You are browsing archives for
Category: Security Trainings
Information Security Trainings by SecurityXploded
Session 11 – Practical Reversing Part VI
This session will discuss some protections added by the operating systems and processors to mitigate the exploitation, after that, also present some ways to bypass those protections.
Session 10 – Practical Reversing Part V
Exploit is one of the most dangerous thing you will ever see in the history of computer science. It is a digital nuclear bomb. Now you can imagine how important is this session. This session will discuss some of the basic techniques of exploitation, some of these techniques may not work on latest operating system […]
Session 9 – Practical Reversing Part IV
This session will discuss some advanced techniques used by the malwares and cover some end to end techniques for malware analysis.
Session 8 – Practical Reversing Part III
Memory forensics is itself a complete domain in malware analysis. It is a process to identify the artefacts of malwares into the system after the infection. It is a branch of investigation and allow people to calculate the damage and risk of an malicious event. Check the reference section for additional material.
Session 7 – Practical ReversingPart II –
In reverse engineering understanding cryptographic functions and packers are the two most challenging and sophisticated tasks. In real life virtually all malwares use some form of packing so understanding packing/unpacking is one of the most important task in malware analysis. Check the reference section for additional material. We highly recommend Lena151 (see reference) material for […]
Session 6 – Practical Reversing Part I –
This session will introduce you with our first practical reversing class. If you are completely new to reverse engineering then mark this session as your reference. Understand each word of this session and explore them offline. Check the reference section for additional material. <
Session 2 – Introduction to Windows Inte
This presentation will cover some must have things about windows internals. This session is very important so carefully read all the slides and reference links.
Session 1 – Reversing & Malware Analysis
This session will guide you to prepare your lab for malware analysis. Don’t forget to check the reference links to download the tools.