Pluralsight – Malware Analysis – Identifying and Defeating Packing

Pluralsight – Malware Analysis – Identifying and Defeating Packing
English | Size: 363.28 MB
Category: Security

Malware authors routinely utilize packing techniques to complicate the analysis of their code. This course will teach you techniques for identifying and defeating packing so that key characteristics and behaviors can be identified. [Read more…]

PLURALSIGHT MALWARE ANALYSIS IDENTIFYING AND DEFEATING PACKING

PLURALSIGHT MALWARE ANALYSIS IDENTIFYING AND DEFEATING PACKING
English | Size: 366.93 MB
Category: Tutorial

Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. One such technique is packing, in which a malicious program is layered inside another program. In Malware Analysis: Identifying and Defeating Packing, you will gain the skills necessary to not only identify prevalent packing techniques, but also how to effectively defeat them. First, you will learn how packers work and how malware authors regularly use them. Next, you will learn how to detect common packers and methods for unpacking. Finally, you will learn about custom packers, how you can identify them and effective ways for defeating them. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware packing techniques with such tools as IDA Pro and WinDbg, by the end of this course you will have the
knowledge and skills to effectively tackle packing! [Read more…]

SEC599 Defeating Advanced Adversaries – Implementing Kill Chain Defenses

SEC599: Defeating Advanced Adversaries – Implementing Kill Chain Defenses
English | Size: 3.57 GB
Category: e-books

This Course Will Prepare You To:

Understand how recent high-profile attacks were delivered and how they could have been stopped
Implement security controls throughout the different phases in the APT Attack Cycle to prevent, detect, and respond to attacks. We will define the following stages in the APT Attack Cycle:
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command and control
Action on objectives
[Read more…]

Skip to toolbar