Malware Analysis: Identifying and Defeating Packing

Malware Analysis: Identifying and Defeating Packing

.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 2h 17m | 363 MB

Instructor: Josh Stroschein
Malware authors routinely utilize packing techniques to complicate the analysis of their code. This course will teach you techniques for identifying and defeating packing so that key characteristics and behaviors can be identified.

Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. One such technique is packing, in which a malicious program is layered inside another program. In Malware Analysis: Identifying and Defeating Packing, you will gain the skills necessary to not only identify prevalent packing techniques, but also how to effectively defeat them. First, you will learn how packers work and how malware authors regularly use them. Next, you will learn how to detect common packers and methods for unpacking. Finally, you will learn about custom packers, how you can identify them and effective ways for defeating them. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware packing techniques with such tools as IDA Pro and WinDbg, by the end of this course you will have the knowledge and skills to effectively tackle packing!

Download:

http://longfiles.com/w5eejkesmi5e/Malware_Analysis_Identifying_and_Defeating_Packing.rar.html

[Fast Download] Malware Analysis: Identifying and Defeating Packing


Related eBooks:
U.S. Marine Close Combat Fighting Handbook
Decrypted Secrets: Methods and Maxims of Cryptology
Computer Information Systems and Industrial Management
Social Engineering: Hacking Systems, Nations, and Societies
The Complete WiFi Ethical Hacking Course for Beginners
Machine Learning for Cyber Security
Cuckoo Malware Analysis
Safety Assurance During Food Processing
Security and Privacy in Communication Networks
Photoshop CS6 For Dummies
Provable Security
Mediating Emergencies and Conflicts: Frontline Translating and Interpreting
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.