Syllabus - Malware Analysis and Development
Syllabus - Malware Analysis and Development
Syllabus - Malware Analysis and Development
© TrainSec.net
Workshop Details
Learn advanced analysis techniques from real-world malware and harness this knowledge to craft your
own malware, understanding attacker strategies. Empower yourself with both defensive and offensive
cybersecurity skills in this immersive workshop.
In this hands-on workshop, participants will embark on a journey through the intricate layers of malware,
gaining insights into the techniques employed by cybercriminals to infiltrate systems, steal data, and
wreak havoc. Led by seasoned cybersecurity experts Uriel Kosayev and Pavel Yosifovich, attendees will
delve deep into the anatomy of malware, understanding its structure, behavior, and evasion tactics by
using reverse engineering techniques to develop and understand malware in their innermost
intricate layers form two sides of the same coin, from both a malware researcher/analyst
and a malware developer points of view!
The live sessions will be recorded and handed out to the participants. This will help in case
you miss a session, and/or would benefit from rewatching complex parts.
© TrainSec.net
Introduction & Lab Setup
● What is Malware and what are the common types of malware
● What is Malware Analysis and its purposes
● What is Malware Development and its purposes
● Types and levels of Malware Analysis (static, dynamic, and code reverse engineering)
● Setting up the lab for Malware Analysis and Malware Development
© TrainSec.net
Malware Analysis and Reverse Engineering
● Static and dynamic Reverse Engineering of trending and current malware techniques from info-
stealers, loaders, injectors, ransomware, and more!
Malware Development
● Injection and Hooking Fundamentals
● Injection techniques
● Employing Direct Syscalls in your malware
● Hooking/Unhooking techniques
● Reflective Loading Fundamentals
● 32-bit vs. 64-bit
● Native API fundamentals
● (Ab)using Windows and native APIs
● COM Fundamentals
● (Ab)using COM
● Executing hidden malicious artifacts inside the PE Resource (.rsrc) section
● Executing hidden malicious shellcode from inside the PE Data (.data) section
● Writing a Ransomware
● Writing an Info-Sealer
● Writing malware with Persistence techniques
Bonus Content
• Introduction to Kernel Mode Development
• Manual unpacking using reverse engineering techniques
© TrainSec.net