diff --git a/RE102/re102_inro.md b/RE102/re102_inro.md new file mode 100644 index 0000000..11c481b --- /dev/null +++ b/RE102/re102_inro.md @@ -0,0 +1,41 @@ + +--- +layout: default +permalink: /RE102/intro/ +title: Intro +--- +[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE102/) + +# Introduction # + +![alt text](https://securedorg.github.io/RE102/images/geometricintro.gif "geometricintro") + +# In this workshop you will ... # + +* Reverse Engineer **Real** Malware + +* Understand how Delphi application binaries are structured + +* Learn some evasion techniques (Anti-Re, Anti-Automation, Anti-VM) + +* Learn how to identify an encryption algorithm + +* Execute an assembly program using the Unicorn Engine + +* Identify a custom packing technique + + +## Again, Analysis Flow for Malware Analysis ## + +* Setup a baseline analysis environment + +* Triage to determine a starting point + +* Static Analysis - Get a sense of where everything is before debugging + +* Dynamic Analysis - Determine behaviors that can’t be understood by static analysis + +* Manual Debugging - Stepping through the program to navigate to your goals + + +[Next -> Section 1](https://securedorg.github.io/RE102/section1)