mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2026-01-14 11:44:31 +01:00
25 lines
1002 B
Markdown
25 lines
1002 B
Markdown
---
|
||
layout: default
|
||
permalink: /RE102/section8/
|
||
title: Setup
|
||
---
|
||
[Go Back to Reverse Engineering Malware 102](https://securedorg.github.io/RE102/)
|
||
|
||
# Section 8: Conclusion #
|
||
|
||

|
||
|
||
This concludes workshop RE102. I hope you enjoyed the levels of obfuscation and evasion. Here is a summary of what the malware’s packer does.
|
||
|
||
```
|
||
8be8abab0f3ebcc18e7b8b3c437feb073fa7b9b30e8b1eef81451f0938b2a52a
|
||
```
|
||
|
||
The purpose of this workshop was to get you familiar with Anti Reverse Engineering, Encryption, VM Evasion and Packing techniques. As you saw this malware's packer had multiple layers of shellcode and tricks to throw off a reverse engineer. But by breaking things down step by step, you were able to work your way through each challenge.
|
||
|
||

|
||
|
||
Special thanks to Ashkan.
|
||
|
||
[Section 7 <- Back](https://securedorg.github.io/RE102/section7)
|