Главная
Study mode:
on
1
Dynamic Malware Analysis D1P01 Introduction
2
Dynamic Malware Analysis D1P02 Background: VirtualBox
3
Dynamic Malware Analysis D1P03 Background: PEs and Packers
4
Dynamic Malware Analysis D1P04 Background: File Identification
5
Dynamic Malware Analysis D1P05 Background: Windows Libraries
6
Dynamic Malware Analysis D1P06 Background: Windows Processes
7
Dynamic Malware Analysis D1P07 Background: Windows Registry
8
Dynamic Malware Analysis D1P08 Background: Windows Services
9
Dynamic Malware Analysis D1P09 Background: Networking Refresher
10
Dynamic Malware Analysis D1P10 Isolated Malware Lab Setup
11
Dynamic Malware Analysis D1P11 Malware Terminology
12
Dynamic Malware Analysis D1P12 Playing with Malware: Poison Ivy RAT
13
Dynamic Malware Analysis D1P13 Behavioral Analysis Overview
14
Dynamic Malware Analysis D1P14 Persistence Overview
15
Dynamic Malware Analysis D1P15 Persistence Lab Using Autoruns
16
Dynamic Malware Analysis D1P16 Persistence Lab Image File Execution Options
17
Dynamic Malware Analysis D1P17 Persistence Lab File System Persistence
18
Dynamic Malware Analysis D1P18 Persistence Lab IMworm with Autoruns
19
Dynamic Malware Analysis D2P01 Day 1 Review
20
Dynamic Malware Analysis D2P02 Persistence Lab IMworm with Regshot
21
Dynamic Malware Analysis D2P03 Persistence Lab Hydraq with Autoruns
22
Dynamic Malware Analysis D2P04 Persistence Lab Hydraq with Regshot
23
Dynamic Malware Analysis D2P05 Maneuvering Overview
24
Dynamic Malware Analysis D2P06 Maneuvering Code Injection Overview
25
Dynamic Malware Analysis D2P07 Maneuvering Lab Parite
26
Dynamic Malware Analysis D2P08 Background Windows APIs
27
Dynamic Malware Analysis D2P09 Maneuvering Lab Onlinegames1 Lab
28
Dynamic Malware Analysis D2P10 Maneuvering Lab Onlinegames2 Lab
29
Dynamic Malware Analysis D2P11 Maneuvering DLL Search Path Hijacking And APC Overview
30
Dynamic Malware Analysis D2P12 Maneuvering Lab Checking Known Dlls
31
Dynamic Malware Analysis D2P13 Maneuvering Lab Nitol
32
Dynamic Malware Analysis D2P14 Maneuvering IAT EAT Inline Hooking Overview
33
Dynamic Malware Analysis D2P15 Malware Functionality Overview
34
Dynamic Malware Analysis D2P16 Malware Functionality Keylogging Overview
35
Dynamic Malware Analysis D2P17 Malware Functionality Lab SetWindowsHookEx
36
Dynamic Malware Analysis D2P18 Malware Functionality Backdoor Overview
37
Dynamic Malware Analysis D2P19 Malware Functionality Backdoor Lab Sticky Keys
38
Dynamic Malware Analysis D2P20 Malware Functionality Phone Home Lab DarkShell
39
Dynamic Malware Analysis D3P01 Day 2 Review
40
Dynamic Malware Analysis D3P02 Degrading Security Overview
41
Dynamic Malware Analysis D3P03 Degrading Security Lab SpyEye
42
Dynamic Malware Analysis D3P04 Degrading Security Lab Conficker Prelude
43
Dynamic Malware Analysis D3P05 Analyzing DLLs
44
Dynamic Malware Analysis D3P06 Degrading Security Lab Conficker And Service State Diffing
45
Dynamic Malware Analysis D3P07 Self Destruction
46
Dynamic Malware Analysis D3P08 Self Destruction Detection With CaptureBAT
47
Dynamic Malware Analysis D3P09 Hiding Files Lab IMWorm
48
Dynamic Malware Analysis D3P10 Self Avoidance
49
Dynamic Malware Analysis D3P11 Self Avoidance Lab Poison Ivy
50
Dynamic Malware Analysis D3P12 Anti-VM Techniques
51
Dynamic Malware Analysis D3P13 Automated Dynamic Analysis Sandboxes
52
Dynamic Malware Analysis D3P14 Automated Dynamic Analysis Sandboxes CuckooSandbox Lab PoisonIvy
53
Dynamic Malware Analysis D3P15 MAEC
54
Dynamic Malware Analysis D3P16 Automated Dynamic Analysis Sandboxes CuckooSandbox Lab Parite
55
Dynamic Malware Analysis D3P17 Actionable Output Yara
56
Dynamic Malware Analysis D3P18 Actionable Output Yara Lab Bot Classification
57
Dynamic Malware Analysis D3P19 Actionable Output Snort
58
Dynamic Malware Analysis D3P20 Actionable Output Snort Lab Detecting Beaconing
59
Dynamic Malware Analysis D3P21 Class Summary
Description:
Dive into a comprehensive 3-day course on dynamic malware analysis led by Veronica Kovah. Explore essential topics including virtualization, Windows internals, malware terminology, and behavioral analysis techniques. Learn to set up isolated malware labs, analyze persistence mechanisms, and understand various malware functionalities such as code injection, keylogging, and backdoors. Gain hands-on experience with tools like Autoruns, Regshot, and CaptureBAT while examining real-world malware samples. Discover automated analysis techniques using sandboxes like Cuckoo, and create actionable outputs with Yara rules and Snort signatures. Master the skills needed to effectively analyze and combat modern malware threats through practical labs and in-depth lectures.

Dynamic Malware Analysis

Add to list
0:00 / 0:00