mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-24 01:14:24 +01:00
Create re102_inro.md
This commit is contained in:
41
RE102/re102_inro.md
Normal file
41
RE102/re102_inro.md
Normal file
@@ -0,0 +1,41 @@
|
||||
|
||||
---
|
||||
layout: default
|
||||
permalink: /RE102/intro/
|
||||
title: Intro
|
||||
---
|
||||
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE102/)
|
||||
|
||||
# Introduction #
|
||||
|
||||

|
||||
|
||||
# In this workshop you will ... #
|
||||
|
||||
* Reverse Engineer **Real** Malware
|
||||
|
||||
* Understand how Delphi application binaries are structured
|
||||
|
||||
* Learn some evasion techniques (Anti-Re, Anti-Automation, Anti-VM)
|
||||
|
||||
* Learn how to identify an encryption algorithm
|
||||
|
||||
* Execute an assembly program using the Unicorn Engine
|
||||
|
||||
* Identify a custom packing technique
|
||||
|
||||
|
||||
## Again, Analysis Flow for Malware Analysis ##
|
||||
|
||||
* Setup a baseline analysis environment
|
||||
|
||||
* Triage to determine a starting point
|
||||
|
||||
* Static Analysis - Get a sense of where everything is before debugging
|
||||
|
||||
* Dynamic Analysis - Determine behaviors that can’t be understood by static analysis
|
||||
|
||||
* Manual Debugging - Stepping through the program to navigate to your goals
|
||||
|
||||
|
||||
[Next -> Section 1](https://securedorg.github.io/RE102/section1)
|
||||
Reference in New Issue
Block a user