Companies Home Search Profile

Mastering Reverse Engineering & Malware Analysis | REMASM+

Focused View

OCSALY Academy | 160.000+ Students

10:48:18

51 View
  • 1. The Disassembly Theory.mp4
    02:25
  • 2. Disassembly - What.mp4
    04:44
  • 1. Analysis of Binary and 4 Stages of Compilation.mp4
    05:58
  • 2. Preprocessing.mp4
    08:02
  • 3. Compilation Phase.mp4
    05:02
  • 4. Assembly Phase.mp4
    04:24
  • 5. Linking Phase.mp4
    06:37
  • 1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4
    13:41
  • 2. Learning ELF Fields.mp4
    12:12
  • 3. Learning ELF Program Header Fields.mp4
    14:34
  • 1. Fundamentals of Windows PE Format.mp4
    17:53
  • 1. Using READELF for Viewing Symbolic Information.mp4
    06:46
  • 2. Revealing Contents of Object File.mp4
    10:43
  • 3. Trying to Analyze Binary Executable.mp4
    08:56
  • 4. How binary loads and executes in theory.mp4
    06:57
  • 1. Downloading Ghidra and File Structure.mp4
    11:00
  • 2. Installing JDK in Linux.mp4
    03:14
  • 3. Installing JDK in Windows or MacOS.mp4
    03:51
  • 4. Installing SASM.mp4
    09:48
  • 1. Hello world with makefile.mp4
    19:22
  • 2. Why nasm is best and compare assemblers.mp4
    03:06
  • 3. Sticking to traditions - Hello world program without makefile.mp4
    11:43
  • 1. Understanding CPU architectures and Binaries.mp4
    03:29
  • 2. Converting Decimal to Binary with Basic Math.mp4
    11:10
  • 1. Starting gdb and setting flavors.mp4
    09:21
  • 2. Debugging and Finding Variables in Memory addresses.mp4
    11:07
  • 3. Learning more with GDB.mp4
    10:28
  • 1. Coding ASM file.mp4
    12:03
  • 2. Analyzing Output with GDB and creating makefile.mp4
    17:09
  • 1. The OR.mp4
    06:34
  • 2. NOT.mp4
    04:37
  • 3. XOR.mp4
    06:42
  • 4. AND.mp4
    07:34
  • 1. Developing another Assembly Program to Analyze with DDD.mp4
    11:59
  • 2. Analyzing Previously Written Code.mp4
    09:49
  • 3. Using DDD and Analyzing RAX Values.mp4
    15:52
  • 1.1 A1 - code.txt
  • 1. Using Conditions and Jumping.mp4
    17:30
  • 2.1 A2.txt
  • 2. Jump if equal.mp4
    05:52
  • 3.1 A3.txt
  • 3. Jump if Not Equal.mp4
    04:06
  • 4.1 A4.txt
  • 4. Jump if Greater.mp4
    07:52
  • 5.1 A5.txt
  • 5. Greater than or Equal to.mp4
    07:40
  • 6.1 A6.txt
  • 6. Jump if Less.mp4
    07:43
  • 7.1 A7.txt
  • 7. Jump if less or equal.mp4
    09:59
  • 8.1 A8.txt
  • 8. Jump if Above.mp4
    11:00
  • 9.1 A9.txt
  • 9. Jump if Above or Equal.mp4
    09:11
  • 10.1 A10.txt
  • 10. Jump if below.mp4
    09:48
  • 11.1 A11.txt
  • 11. Jump if below or equal.mp4
    08:58
  • 1.1 a1.txt
  • 1. Developing Loop and Calculator Project with Assembly.mp4
    08:04
  • 2.1 a2.txt
  • 2. Testing our Project.mp4
    11:52
  • 1.1 a1.txt
  • 1. Project EXABYTE.mp4
    23:56
  • 2. Testing and Analyzing Project with Readelf and GDB.mp4
    21:33
  • 1. Defining variables.mp4
    12:40
  • 2.1 a2.txt
  • 2. Addition and Subtraction.mp4
    11:19
  • 3.1 a3 - fixed.txt
  • 3. Last Decorations.mp4
    16:36
  • 4.1 a4.txt
  • 4. Explaining Registers in Practice.mp4
    11:00
  • 5.1 a5.txt
  • 5. Completing Section.mp4
    10:20
  • 1. Opening project in Ghidra.mp4
    14:24
  • 2. Discovering Ghidra.mp4
    09:04
  • 1.1 A1 M4lware Sample 1.zip
  • 1. Starting Real Malware Analysis with Ghidra.mp4
    07:54
  • 2. Analyzing Suspicious String using Ghidra.mp4
    11:07
  • 3. OSINT for Reverse Engineering.mp4
    05:41
  • 4. Analyzing Libraries that Malware Uses.mp4
    03:12
  • 5. Extracting SYS file from Malware.mp4
    11:46
  • 6. Finding Entry Points and Changing Undefined Function Names.mp4
    04:50
  • 1. Downloading and Installing IDA Pro IDA Freeware.mp4
    08:49
  • 2. Being friends with IDA.mp4
    08:27
  • 3. Useful Tabs in IDA.mp4
    07:13
  • Description


    Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra,x86-64, IDA Pro, IDA Free, Assembly and NASM

    What You'll Learn?


    • The theory behind disassembly and its role in reverse engineering.
    • The four stages of binary analysis: Preprocessing, Compilation, Assembly, and Linking.
    • The compilation process breakdown and the purpose of each phase.
    • Working with symbolic information in stripped and not stripped binaries.
    • How binary executables load and execute.
    • Installation and basics of Ghidra, a tool for reverse engineering.
    • Installing the Java Development Kit (JDK) for Ghidra.
    • Navigating and utilizing Ghidra for project analysis.
    • Real-world malware analysis using Ghidra.
    • Practical reverse engineering skills through hands-on malware analysis.
    • Writing a 64-bit assembly program to display "Hello, world!" using a makefile.
    • Installing and setting up the SASM assembler for assembly programming.
    • Understanding the superiority of NASM (Netwide Assembler) and comparing it with other assemblers.
    • Creating a basic "Hello, world!" program in assembly without using a makefile.
    • Exploring the theory of disassembly and disassemblers in reverse engineering.
    • Analyzing the fundamentals of disassembly and its importance in reverse engineering.
    • Delving into various data types and their representation in assembly language.
    • Understanding CPU architectures, binary files, and their relationship.
    • Converting decimal numbers to binary using basic mathematical operations in assembly.
    • Initiating debugging with gdb (GNU Debugger) and configuring debugging flavors.
    • Debugging techniques for locating and inspecting variables in memory addresses.
    • Expanding knowledge of gdb functionalities for advanced debugging scenarios.
    • Writing a second 64-bit assembly program, creating the source code, and generating a makefile.
    • Analyzing program output using gdb and building a makefile for the assembly code.
    • Exploring binary analysis and comprehending the four stages of compilation.
    • Learning about preprocessing, compilation, assembly, and linking phases of program compilation.
    • Distinguishing between symbols, stripped, and non-stripped binaries.
    • Utilizing READELF to view symbolic information in binaries and object files.
    • Revealing the contents of an object file and attempting to analyze binary executables.
    • Understanding how binary files load and execute in theory.
    • Exploring the Executable and Linkable Format (ELF) used in Linux executables, focusing on the executable header.
    • Learning about ELF fields and ELF program header fields.
    • Understanding the fundamentals of Windows PE (Portable Executable) format used in Windows executables.
    • Mastering bitwise logical operations: OR, XOR, NOT, and AND.
    • Applying OR logic to manipulate data and perform bitwise operations.
    • Implementing NOT logic to invert bits in assembly programming.
    • Exploring XOR logic and its applications in data manipulation.
    • Understanding AND logic and how it's used for masking and bit filtering.
    • Utilizing the Data Display Debugger (DDD) to analyze assembly programs.
    • Developing assembly programs to analyze using DDD and understanding the debugging process.
    • Analyzing RAX register values using DDD and gdb.
    • Mastering control flow with jump and loop instructions in assembly.
    • Learning about common errors in assembly programming and their solutions.
    • Using conditional statements and jumps to control program flow.
    • Implementing jump instructions based on equality conditions.
    • Understanding jump instructions for inequality conditions.
    • Employing jump instructions for comparisons involving greater values.
    • Implementing jump instructions for greater-than-or-equal-to conditions.
    • Using jump instructions for comparisons involving lesser values.
    • Implementing jump instructions for less-than-or-equal-to conditions.
    • Developing an assembly project that utilizes jump and loop instructions effectively.
    • Creating a calculator project using assembly language to perform arithmetic operations.
    • Defining variables and memory allocation in assembly programming.
    • Implementing addition and subtraction operations in assembly language.
    • Adding final touches and decorations to assembly projects.
    • Explaining the practical usage of registers in assembly programming.
    • Completing the assembly projects with a focus on optimization and efficiency.
    • Utilizing memory manipulation techniques to interact with data structures.
    • Exploring a more advanced project called "EXABYTE" involving memory manipulation.
    • Testing and analyzing projects using tools like Readelf and GDB for verification and debugging.

    Who is this for?


  • For everyone who wants to learn reverse engineering
  • What You Need to Know?


  • Basic computer skills
  • More details


    Description

    Welcome to a best online learning experience that delves deep into the fascinating world of reverse engineering and malware analysis.

    In this comprehensive course, you'll embark on a journey that unravels the complexities of software, empowering you to decode its inner workings, uncover vulnerabilities, and fortify digital defenses. Join us in "Mastering Reverse Engineering and Malware Analysis" to acquire the skills needed to navigate the digital landscape with confidence and expertise.


    Discover the Essence of Reverse Engineering and Malware Analysis


    Reverse engineering is the intricate process of dissecting software and systems to understand their architecture and functionality. It involves peeling back the layers of code to uncover hidden intricacies, enabling you to comprehend how software operates, regardless of whether it was originally developed by you or others. This skill empowers you to identify vulnerabilities, optimize performance, and enhance software security.

    Malware analysis, a crucial facet of cybersecurity, is the art of dissecting malicious software to understand its behavior, intent, and potential impact. By analyzing malware, experts gain insights into the techniques employed by cybercriminals, enabling them to develop effective countermeasures and safeguard digital assets. Understanding malware analysis equips you to identify, neutralize, and prevent cyber threats, making it an essential skill in today's interconnected world.


    Why is Reverse Engineering and Malware Analysis Essential?

    In the digital age, where technology governs every facet of our lives, the significance of reverse engineering and malware analysis cannot be overstated. Here's why mastering these skills is paramount:

                               1. Digital Defense Mastery:

    The cyber landscape is riddled with threats, from sophisticated malware to intricate hacking techniques. By mastering reverse engineering and malware analysis, you empower yourself to uncover vulnerabilities and proactively defend against potential attacks. Your ability to dissect and understand malicious code allows you to devise robust countermeasures that thwart cybercriminals' efforts.

                               2. Innovate with Confidence:

    Reverse engineering transcends mere analysis; it's also a tool for innovation. By studying existing software, you can extract insights, identify best practices, and develop enhanced versions or entirely new solutions. This process enables you to create innovative software, saving time and effort by building upon existing foundations.

                               3. Strengthen Software Security:

    Malware analysis is your armor against cyber threats. As cybercriminals devise increasingly sophisticated attacks, understanding their tactics is crucial for developing effective defense mechanisms. By studying malware behavior, you gain the insights needed to prevent future threats, ensuring the safety of sensitive data and digital operations.

                               4. Unlock Career Opportunities:

    In the ever-evolving landscape of technology, professionals with reverse engineering and malware analysis skills are in high demand. Organizations across industries seek experts who can safeguard their digital assets, analyze software for vulnerabilities, and contribute to the development of secure, cutting-edge solutions. Mastering these skills opens doors to lucrative career opportunities in cybersecurity, software development, and more.

                               5. Empower Ethical Hacking:

    Ethical hacking leverages the knowledge gained from reverse engineering to identify vulnerabilities in systems and networks. This practice helps organizations identify weak points before malicious actors exploit them. By mastering reverse engineering, you become an asset in ethical hacking, contributing to the protection of digital infrastructure.

                               Experience the Power of Mastery

    Embrace the transformative journey of "Mastering Reverse Engineering and Malware Analysis." This course isn't just about acquiring skills; it's about unlocking a world of possibilities. From deciphering complex software to safeguarding digital assets and innovating with confidence, you'll gain the expertise needed to excel in the realm of technology. Join us and become a digital guardian, equipped to decode, defend, and drive progress in the digital age. Enroll today to step into a realm where knowledge empowers, and possibilities are limitless.

    Who this course is for:

    • For everyone who wants to learn reverse engineering

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    OCSALY Academy | 160.000+ Students
    OCSALY Academy | 160.000+ Students
    Instructor's Courses
    The OCSALY’s goal in the next three years, is to teach 2 million people new skills.Also OCSALY’s own courses, which are all available here, we are working with the very best instructors, creating courses to teach the essential skills required by developers, at all levels.One other important philosophy is that our courses are taught by real professionals; software developers, digital forensics investigators with real and substantial experience in the industry, who are also great teachers.  All our instructors are experienced, software developers!Our team is ONLINE creating new courses and answering your questions right now.Whether you are a beginner, looking to learn how to program for the very first time, or to brush up on your existing skills, or to learn new languages, frameworks or skills, the Academy has you covered all resources to learn from professional instructors !
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 67
    • duration 10:48:18
    • Release Date 2023/09/10