Files
securedorg.github.io/RE102/re102_intro.md
2017-08-09 12:14:49 -07:00

41 lines
1.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
layout: default
permalink: /RE102/intro/
title: Intro
---
[Go Back to Reverse Engineering Malware 102](https://securedorg.github.io/RE102/)
# Introduction #
![alt text](https://securedorg.github.io/RE102/images/geometricintro.gif "geometricintro")
# In this workshop you will ... #
* Reverse Engineer **Real** Malware
* Understand how Delphi application binaries are structured
* Learn some evasion techniques (Anti-Re, Anti-Automation, Anti-VM)
* Learn how to identify an encryption algorithm
* Execute an assembly program using the Unicorn Engine
* Identify a custom packing technique
## Again, Analysis Flow for Malware Analysis ##
* Setup a baseline analysis environment
* Triage to determine a starting point
* Static Analysis - Get a sense of where everything is before debugging
* Dynamic Analysis - Determine behaviors that cant be understood by static analysis
* Manual Debugging - Stepping through the program to navigate to your goals
[Next -> Section 1](https://securedorg.github.io/RE102/section1)