Reverse Engineering Advanced Ransomware Reverse Engineering

HackingAssets

Member
Lucifer
Joined
Aug 12, 2022
Messages
163
Hellcoins
♆1,601
Username Style (Gradient Colours)

Advanced Ransomware Reverse Engineering

Reverse engineering. Advanced Debugging, Obfuscations and Anti-Analysis. Writing decryptors

What you'll learn

  • This course is a continuation of our first class, Reverse Engineering Malware, but don’t worry, that is not a prerequisite.
  • Identify and work around anti-virtualisation techniques deployed inside malware samples
  • Dynamic analysis of sample’s activity on a Windows box
  • Advanced debugging techniques
  • Use static analysis to discover and understand encryption algorithms
  • Discover, and work-around, obfuscation tricks and anti-static analysis tricks
  • Discover flaws that allow us to recover encrypted files
  • Write decryptors in Python and C
  • Patience and a lot of perseverance to “try harder
This course is a continuation of our first class, Reverse Engineering Malware, but don’t worry, that is not a pre-requisite. You can start with this course and just dive in. However, if you feel like starting from the basics, we encourage you to check it out!

The aim of this course is to provide a practical approach to analysing ransomware.
More specifically.

We will attack the following topics:
  • Identify and work around anti-virtualisation techniques deployed inside malware samples
  • Dynamic analysis of sample’s activity on a Windows box
  • Advanced debugging techniques
  • Use static analysis to discover and understand encryption algorithms
  • Discover, and work-around, obfuscation tricks and anti-static analysis tricks
  • Discover flaws that allow us to recover encrypted files
  • Write decryptors in Python and C
Course Details

The course begins by going through the necessary precaution measures when working with malware, then quickly dives in analysing actual samples. Since Windows is by far the most popular target platform, we will focus on this operating system.

Neither professional programming experience nor assembly language knowledge are required to benefit from the course, although they would be very helpful when we’ll look at identifying encryption algorithms and bypass anti-virtualisation checks. The concepts will be explained in a clear and concise manner and additional resources will be recommended.

Some programming experience will be very beneficial when we’ll start writing decryptors. However, the focus will be mostly on understanding the algorithms and specifically what information we need to do successful decryptions.
For this reason, full Python and C source code will be provided.

Watch Online On Mega
 
Last edited by a moderator:
Top