From de65954476a766b975c60ac349bd05be41ee17b2 Mon Sep 17 00:00:00 2001 From: "SECURED.ORG" Date: Fri, 30 Jun 2017 15:55:27 -0700 Subject: [PATCH] Create re102_inro.md --- RE102/re102_inro.md | 41 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 RE102/re102_inro.md diff --git a/RE102/re102_inro.md b/RE102/re102_inro.md new file mode 100644 index 0000000..11c481b --- /dev/null +++ b/RE102/re102_inro.md @@ -0,0 +1,41 @@ + +--- +layout: default +permalink: /RE102/intro/ +title: Intro +--- +[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE102/) + +# Introduction # + +![alt text](https://securedorg.github.io/RE102/images/geometricintro.gif "geometricintro") + +# In this workshop you will ... # + +* Reverse Engineer **Real** Malware + +* Understand how Delphi application binaries are structured + +* Learn some evasion techniques (Anti-Re, Anti-Automation, Anti-VM) + +* Learn how to identify an encryption algorithm + +* Execute an assembly program using the Unicorn Engine + +* Identify a custom packing technique + + +## Again, Analysis Flow for Malware Analysis ## + +* Setup a baseline analysis environment + +* Triage to determine a starting point + +* Static Analysis - Get a sense of where everything is before debugging + +* Dynamic Analysis - Determine behaviors that can’t be understood by static analysis + +* Manual Debugging - Stepping through the program to navigate to your goals + + +[Next -> Section 1](https://securedorg.github.io/RE102/section1)