mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2026-01-16 04:34:24 +01:00
41 lines
1.0 KiB
Markdown
41 lines
1.0 KiB
Markdown
---
|
||
layout: default
|
||
permalink: /RE102/intro/
|
||
title: Intro
|
||
---
|
||
[Go Back to Reverse Engineering Malware 102](https://securedorg.github.io/RE102/)
|
||
|
||
# Introduction #
|
||
|
||

|
||
|
||
# In this workshop you will ... #
|
||
|
||
* Reverse Engineer **Real** Malware
|
||
|
||
* Understand how Delphi application binaries are structured
|
||
|
||
* Learn some evasion techniques (Anti-Re, Anti-Automation, Anti-VM)
|
||
|
||
* Learn how to identify an encryption algorithm
|
||
|
||
* Execute an assembly program using the Unicorn Engine
|
||
|
||
* Identify a custom packing technique
|
||
|
||
|
||
## Again, Analysis Flow for Malware Analysis ##
|
||
|
||
* Setup a baseline analysis environment
|
||
|
||
* Triage to determine a starting point
|
||
|
||
* Static Analysis - Get a sense of where everything is before debugging
|
||
|
||
* Dynamic Analysis - Determine behaviors that can’t be understood by static analysis
|
||
|
||
* Manual Debugging - Stepping through the program to navigate to your goals
|
||
|
||
|
||
[Next -> Section 1](https://securedorg.github.io/RE102/section1)
|