Skip to content

ivanol55/malware-reverse-engineering-and-analysis-notes

Repository files navigation

Malware reverse engineering and analysis notes

What are these notes for?

The aim for these notes kept in this repository serve the purpose of teaching you about reverse engineering and malware analysis. This information is gathered from the INE courses for the certification exams of "eLearnSecurity Certified Reverse Engineer" and "eLearnSecurity Certified Malware Analyst Professional". The INE courses these notes come from are Practice-based courses with dozens of guided exercises that will challenge your mind with hardcore technical topics. This aims to consolidate your knowledge of the following:

  • Start from the basics up to highly technical chapters
  • Learn about IA-32 CPU Architecture
  • Learn about functions, stack frames, heaps, exceptions, important Ring3 Windows internal structures, PE file format
  • Work with realistic malware samples created to prepare you for real-world samples
  • Analyze real-world samples: ransomware, botnets, rats, etc.
  • Explore an entire module dedicated to x64 bit assembly as a programming crash course
  • Dive into the TLS method
  • Understand how malware uses Windows APIs to achieve their malicious activity
  • Debug samples using different debuggers

Quick access to categories

  1. The necessary theory 1: CPU registers
  2. The necessary theory 2: Processes and threads
  3. The necessary theory 3: Heaps, handles and exceptions
  4. The necessary theory 4: Virtual Addresses, Relative Virtual Addresses and offsets
  5. Introduction to malware analysis: The basics
  6. Static analysis techniques: Common procedures
  7. Assembly crash course: Writing and debugging assembly code
  8. Behavior analysis: Dynamic analysis techniques
  9. Debugging and disassembly techniques
  10. Obfuscation techniques

About

Notes for the Reverse Engineering Professional INE course

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages