YoVDO

Indicators of Compromise - From Malware Analysis to Eradication

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses Network Security Courses Malware Analysis Courses Windows Internals Courses

Course Description

Overview

Learn to identify and eradicate malware in corporate networks using freely available tools in this 50-minute workshop. Explore techniques from locating unknown malware to analyzing samples and identifying indicators of compromise. Dive into advanced topics like Windows internals, debug object handling, thread hiding, process exploitation, anti-dumping techniques, and virtual machine detection. Gain practical skills in malware analysis, reverse engineering, and enterprise-wide threat mitigation through hands-on exercises and expert guidance.

Syllabus

Intro
About me
Malware Research Lab, 2012
How INT3 breakpoints work
Memory Breakpoints
Hardware breakpoints
Timing
Windows Internals
Debug Object Handle
Thread Hiding
Open Process
Parent Process
UnhandledExceptionFilter
Process Exploitation
Nanomites
Stolen Bytes (Stolen Code)
Virtual Machines (think JVM, not Box)
Guard Pages
Removing the PE Header
Anti-dumping
Exploiting IA-32 Instructions
Interrupt 2D
Stack Segment
Instruction Prefixes
Exploiting LA-32 Instructions
VM Detection
Debugger specific techniques
Other Techniques
Announcement


Taught by

44CON Information Security Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network