Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Syllabus - Malware Analysis and Development

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Malware Analysis and Development

Dive into the World of Malware Offensive Techniques


40 Hours Workshop

© TrainSec.net
Workshop Details
Learn advanced analysis techniques from real-world malware and harness this knowledge to craft your
own malware, understanding attacker strategies. Empower yourself with both defensive and offensive
cybersecurity skills in this immersive workshop.

In this hands-on workshop, participants will embark on a journey through the intricate layers of malware,
gaining insights into the techniques employed by cybercriminals to infiltrate systems, steal data, and
wreak havoc. Led by seasoned cybersecurity experts Uriel Kosayev and Pavel Yosifovich, attendees will
delve deep into the anatomy of malware, understanding its structure, behavior, and evasion tactics by
using reverse engineering techniques to develop and understand malware in their innermost
intricate layers form two sides of the same coin, from both a malware researcher/analyst
and a malware developer points of view!

The live sessions will be recorded and handed out to the participants. This will help in case
you miss a session, and/or would benefit from rewatching complex parts.

Through a series of interactive sessions, participants will:

• Gain fundamental knowledge in C development, x86 Assembly, and computer


architecture.
• Learn and practice fundamental concepts of Windows Internals.
• Learn and practice fundamental techniques and methodologies of malware analysis and
reverse engineering.
• Learn and practice fundamental techniques and methodologies of malware development.
• Explore and employ detection strategies to detect malicious behavior.
• Understand the motivations and strategies behind malware development, from financial gain
to espionage and sabotage.
• Explore real-world case studies to dissect and analyze various types of offensive
techniques employed by malware, from ransomware to advanced persistent threats
(APTs).
• Engage in hands-on exercises to simulate malware analysis and development sharpening your
detection and response skills.

Whether you're an aspiring ethical hacker, a seasoned Cybersecurity professional, a


cybersecurity enthusiast, an IT professional, a Red Teamer, or a Security Researcher, this
workshop offers a unique opportunity to enter deeply into the world of malware offensive
techniques.

© TrainSec.net
Introduction & Lab Setup
● What is Malware and what are the common types of malware
● What is Malware Analysis and its purposes
● What is Malware Development and its purposes
● Types and levels of Malware Analysis (static, dynamic, and code reverse engineering)
● Setting up the lab for Malware Analysis and Malware Development

Introduction to Code Development


● The four stages of software development
● Basic C programming examples
● Developing with Visual Studio, Windows SDK, and compilation tools
● Debugging C source code

Introduction to Code Reverse Engineering


● Introduction to the x86 architecture
● Assembly x86 101
● Memory Types - Stack vs. Heap
● Recognizing common assembly instructions for better malware reverse engineering
● Statically analyzing compiled assembly code with IDA
● Dynamically analyzing compiled assembly code with IDA
● Analyzing .NET compiled malware using dnSpy

Windows Internals Overview


• Processes
• Virtual Memory
• Threads
• DLLs
• User Mode vs. Kernel Mode
• System Calls
• System Architecture
• Windows APIs
• The Native API
• Kernel Object and Handles
• Windows Services
• Security Basics: Tokens, Security Descriptors, Privileges

© TrainSec.net
Malware Analysis and Reverse Engineering
● Static and dynamic Reverse Engineering of trending and current malware techniques from info-
stealers, loaders, injectors, ransomware, and more!

● Identifying common file formats using hex editors and PE parsers


● Malware fingerprinting using calculated hashes
● Using VirusTotal for threat intelligence and multi-AV scanning purposes
● File string extraction and decoding
● Determining obfuscation and Packers
● Inspecting PE header for valuable information and IoC (Indicators of Compromise) gathering
● Classifying malware families and variants
● Packing detection and analysis
● Optimal reverse engineering approaches and methodologies
● Leveraging IDA’s Pseudo Decompilation feature
● Approaching and reading API function documentation
● Renaming functions/subroutines
● Dynamic Reverse Engineering (debugging) with IDA Pro
● Writing your own custom YARA signatures

Malware Development
● Injection and Hooking Fundamentals
● Injection techniques
● Employing Direct Syscalls in your malware
● Hooking/Unhooking techniques
● Reflective Loading Fundamentals
● 32-bit vs. 64-bit
● Native API fundamentals
● (Ab)using Windows and native APIs
● COM Fundamentals
● (Ab)using COM
● Executing hidden malicious artifacts inside the PE Resource (.rsrc) section
● Executing hidden malicious shellcode from inside the PE Data (.data) section
● Writing a Ransomware
● Writing an Info-Sealer
● Writing malware with Persistence techniques

Bonus Content
• Introduction to Kernel Mode Development
• Manual unpacking using reverse engineering techniques

© TrainSec.net

You might also like