0x12 Dark Development
Home
Courses
Introduction Windows Malware Development
Building a Custom Remote Access Trojan (RAT)
Learning C++ for Malware Development
Introduction to Malware Analysis
Modules
Database
Consulting
Login
Register
Home
Malware Analysis
Introduction to Malware Analysis
Introduction to Malware Analysis
Curriculum
11 Sections
51 Lessons
Lifetime
Expand all sections
Collapse all sections
Introduction and Setup
10
1.1
Course Introduction
1.2
Understanding Malware and Its Types
1.3
Installing VBox
1.4
Installing Windows 10
1.5
Installing REmnux
1.6
Installing Flare-VM
1.7
Setting Up Our Network Analysis
1.8
Installing Inetsim
1.9
REmnux VS Flare-VM
1.10
The Art of Malware Analysis
Static Analysis
8
2.1
Taking Snapshot
2.2
Downloading Malware Samples
2.3
Getting File Format
2.4
Getting File-Hash and Using Virus-total
2.5
Searching For Strings
2.6
Windows API
2.7
PE-File Format
2.8
Packers
Dynamic Analysis
7
3.1
Introduction To Network Analysis
3.2
Procmon Part 1
3.3
Procmon Part 2
3.4
Dynamic Analysis Part 1
3.5
Dynamic Analysis Part 2
3.6
Targeting Windows Registry
3.7
Analyzing a Reverse Shell
Advanced Static Analysis
8
4.1
Introduction
4.2
Definition of Assembly Language and its Importance
4.3
Low level Vs High Level
4.4
CPU and ISA
4.5
Assembly Language Basics
4.6
Ghidra Basics Part 1
4.7
Ghidra Basics Part 2
4.8
Ghidra Basics Part 3
Advanced Dynamic Analysis
5
5.1
What is Debugging
5.2
Debug Your First Program
5.3
Binary and Memory Patching
5.4
Bypass Anti Debugging
5.5
Unpacking
YARA
2
6.1
What Is YARA And Its Rules
6.2
Writing Your Own Rules
Lab 1 Ransomware Analysis
2
7.1
Dissecting WannaCry Part1
7.2
Dissecting WannaCry Part 2
Lab 2 Ransomware Analysis In-depth
2
8.1
Deep Dissecting the Ransomware Part 1
8.2
Deep Dissecting the Ransomware Part 2
Shellcode Analysis
1
9.1
Shellcode Analysis Technique
Malicious Document Analysis
4
10.1
PDF File Analysis Part 1
10.2
PDF File Analysis Part 2
10.3
Document File Analysis Part 1
10.4
Document File Analysis Part 2
Dealing with C# malware
2
11.1
Reverse simple C# application
11.2
Black-NET analysis
Course Introduction
Additional Resources
Leave a Reply
Cancel reply
You must be
logged in
to post a comment.
Modal title
Main Content