O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Advanced Malware Analysis

Video Description

Understand malware behavior and evade it using IDA Pro, OllyDbg, and WINDBG

About This Video

  • Master advanced malware analysis topics
  • Hands-on experience with popular analysis tools
  • Covers advanced topics on malware behavior and evasion

In Detail

In this video course, we cover advanced malware analysis topics. Towards this goal, we first understand the behavior of different classes of malware. Such knowledge helps us to easily categorize malware based on its characteristic. We see how sophisticated malware can use techniques to either evade detection or increase its damage and access to the system.

Then we learn advanced techniques in static and dynamic malware analysis and cover the details and powerful features of OllyDbg, IDA Pro, and WINDBG. We also explore defense mechanisms against malware, create a signature for malware, and set up an intrusion detection system (IDS) to prevent attacks.

Finally, we cover the concept of packers and unpackers, and explore how to unpack packed malware to analyze it.

The code bundle for this video course is available at- https://github.com/PacktPublishing/-Advanced-Malware-Analysis

Table of Contents

  1. Chapter 1 : Exploring Malware Functionalities
    1. The Course Overview 00:04:19
    2. Backdoors 00:10:57
    3. Keyloggers and Information Stealers 00:06:37
    4. Downloaders 00:05:55
    5. Ransomware 00:09:05
    6. Rootkits 00:09:04
  2. Chapter 2 : Malware Advanced Techniques
    1. Privilege Escalation 00:07:32
    2. Persistence Methods 00:04:36
    3. Data Encoding 00:08:36
    4. Covert Launching Techniques 00:07:08
  3. Chapter 3 : Advanced Dynamic Malware Analysis
    1. Using a Debugger 00:03:12
    2. An Overview of the Windows Environment 00:07:20
    3. User Mode Debugging 00:05:44
    4. Malware Analysis Using OllyDbg 00:15:43
    5. Features of OllyDbg 00:11:12
    6. Kernel Mode Debugging 00:03:25
    7. Malware Analysis Using WINDBG 00:08:21
    8. Features of WINDBG 00:05:52
  4. Chapter 4 : Advanced Static Malware Analysis
    1. Advanced Notes on the x86 Architecture 00:08:34
    2. How a Disassembler Can Help Us 00:04:30
    3. Loading and Navigating Using IDA Pro 00:09:40
    4. Functions in IDA 00:07:49
    5. IDA Pro Graphic Features 00:07:28
    6. Analysing Malware Using IDA Pro 00:08:40
  5. Chapter 5 : How to Detect and Defend against Malware in a Network
    1. Malware Detection Techniques 00:04:58
    2. Steps to Clean a Compromised Network 00:05:07
    3. How Intrusion Detection Systems Work 00:02:22
    4. An Introduction to Snort 00:02:09
    5. How to Setup Snort? 00:12:24
    6. How to Create a Signature? 00:07:14
    7. Why Hybrid Analysis? 00:04:22
  6. Chapter 6 : How to Deal with Evasive Malware
    1. How Do Packers Work? 00:02:38
    2. How to Detect Packed Malware? 00:05:11
    3. How to Unpack a Malware Program? 00:03:16
    4. Examples of Unpacking a Malware Program 00:12:31