Malware Analysis
Introduction
This course will give you a thorough understanding of various types of malware including viruses, worms, backdoors, and malicious mobile code. You will also learn how to identify malware and analyze it in a lab environment using static and dynamic methods. An overview will be provided on the disassembling and reverse-engineering aspect.
Who should attend?
Incident Response and Forensic Analysts, security professionals responsible for protecting organizations from malware attacks or any other network / system administrators keen on knowing the details of malware.
Duration
2 Days
Topics Covered
Introduction to Malware
- About malware
- Types of malware
- What malware can do
Viruses and Worms
- History of viruses
- Types of viruses - boot/file infectors, multipartite, macro, stealth, polymorphic and others
- Types of worms - file sharing, smtp, multiexploit, multiplatform
- Differences in viruses and worms
Backdoors, Trojans and Rootkits
- Types of backdoors - CLI access, GUI access, command execution
- Demonstration using NetCat
- ICMP Backdoors
- Types of Rootkits - User-mode, Kernel-mode
- Rootkits on Windows & Linux
Bots and Botnets
- Introduction to bots and botnets
- Uses of botnets - DdoS, spamming, advertising, spying
- Types of botnets - Agobot, SDbot, mIRC bots etc.
Mobile Malware
- Client-side scripts
- ActiveX / Java applets
Buffer Overflows and Shellcodes
Identifying and Defending against Malware
- Scanning - signatures, heuristics
- Online Anti-virus
- Personal firewalls
- Patching and secure configuration
- User education
Malware Analysis
- Building a lab for malware analysis
- Static analysis - strings, script analysis, disassembling
- Runtime analysis - Monitoring access to files, registry or disk, monitoring processes, monitoring network activity, looking for listening ports, debugging
- Analyzing network traffic to identify malicious communication
- Understanding covert channels
- Tracking botnets