Reverse Engineering Malware

seeders: 31
leechers: 12
Added on May 19, 2015 by hichysin Other > Tutorials
Torrent verified.



Reverse Engineering Malware (Size: 2.11 GB)
 Reverse Engineering Malware Day 1 Part 17_ Malware Unpacking.mp4205.87 MB
 Reverse Engineering Malware Day 1 Part 11_ Data Encoding - Common Algorithms - Base64.mp4197.68 MB
 Reverse Engineering Malware Day 2 Part 5- Anti-Analysis Examples‬ - YouTube.mp4173.89 MB
 Reverse Engineering Malware Day 1 Part 3_ Triage, Tasks, and Tools.mp4150.46 MB
 Reverse Engineering Malware Day 1 Part 10_ Data Encoding - Common Algorithms - Caesar Cipher...146.84 MB
 Reverse Engineering Malware Day 2 Part 1_ Network Communications - Introduction, Finding the...133.85 MB
 Reverse Engineering Malware Day 1 Part 15_ Data Decoding.mp4119.26 MB
 Reverse Engineering Malware Day 1 Part 9_ Data Encoding.mp4113.92 MB
 Reverse Engineering Malware Day 2 Part 3- DLL Analysis‬ - YouTube.mp4100.13 MB
 Reverse Engineering Malware Day 1 Part 7_ Know Your Tools.mp493.69 MB
 Reverse Engineering Malware Day 1 Part 5_ Analysis Methods.mp484.74 MB
 Reverse Engineering Malware Day 1 Part 2_ Analysis Goals.mp478.24 MB
 Reverse Engineering Malware Day 2 Part 4- Anti-Analysis‬ - YouTube.mp470.4 MB
 Reverse Engineering Malware Day 1 Part 1_ Prerequisites.mp464.46 MB
 Reverse Engineering Malware Day 1 Part 12_ Data Encoding - Common Algorithms - Crypto.mp464.09 MB
 Reverse Engineering Malware Day 2 Part 2- Network Communications - Command & Control,...61.18 MB
 Reverse Engineering Malware Day 1 Part 14- Data Encoding - Common Algorithms - String...59.79 MB
 Reverse Engineering Malware Day 1 Part 6_ Execution and Persistence.mp448.66 MB
 Reverse Engineering Malware Day 2 Part 7- Shellcode Analysis‬ - YouTube.mp448.44 MB
 Reverse Engineering Malware Day 1 Part 8_ Generic RE Algorithm.mp439.15 MB
 Reverse Engineering Malware Day 1 Part 4_ Malware Lab Setup.mp432.02 MB
 Reverse Engineering Malware Day 2 Part 6- How CreateFile() Works‬ - YouTube.mp425.24 MB
 Reverse Engineering Malware Day 1 Part 13- Data Encoding - Common Algorithms - Compression‬ -...23.91 MB
 Reverse Engineering Malware Day 1 Part 16- How a Debugger Works‬ - YouTube.mp410.54 MB
 Reverse Engineering Malware Day 1 Part 18- Day 1 Review‬ - YouTube.mp410.09 MB

Description

An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist.

As we store more of our confidential information on our computers, from bank account credentials, to company secrets, the reward to risk ratio increases as has the number malware (malicious software) threats. While anti-virus and intrusion detection systems have improved over the years, nothing can substitute a skilled malware analyst when a business needs to understand and mitigate a network intrusion.

This class picks up where the Introduction to Reverse Engineering of Software course left off, exploring how static reverse engineering techniques can be used to understand what a piece of malware does and how it can be removed.

Topics include:
- Understanding common malware features and behavior
- Defeating code armoring and obfuscation
- Signature creation and applying prior analysis
- Dynamic analysis tools and how they can aid static analysis

During the course students will complete many hands on exercises.

Before taking this class you should take Introduction to Intel x86 and Introduction to Reverse Engineering Software or have equivalent knowledge. (if some one need this request it or PM )

Get the class materials to follow along at

Sharing Widget


Download torrent
2.11 GB
seeders:31
leechers:12
Reverse Engineering Malware

All Comments

Thanks a lot buddy
u are welcome
SEXY UPLOAD!
Thanks a lot, please upload more like these.
u are welcome and i will try to uploads .