What you'll learn:
- You will learn to analyze, prevent and codify ransomware (proof of concept). Source code will be provided for academic purposes.
- You will learn to analyze, prevent and codify a keylogger which can hide in a legitimate windows process (proof of concept). Source code will be provided for academic purposes.
- You will learn to analyze, prevent and codify a keylogger with filter to steal Facebook credentials (proof of concept). Source code will be provided for academic purposes.
- You will learn to analyze, prevent and codify an injector to infect a legitimate Windows process (proof of concept). Source code will be provided for academic purposes.
- You will learn to analyze, prevent and codify a malicious dll (proof of concept). Source code will be provided for academic purposes.
- You will learn how to set up a test lab to safely analyze malware.
- You will learn to differentiate between different types of malware, their behavior, their vectors attack, preventions advices and more.
- You will learn the process a malware follows to get into your system.
- You will learn by doing the main malware components: payload, obfuscator, persistence, stealth, and armoring.
- You will learn how a malware connects to a Command and Control Center and what is its function.
- You will learn to get Indicators of Compromise (IoC) on infected systems.
- You will learn by doing how a simple piece of software could trick users to download malware.
- You will learn to capture malware on your operating system.
- You will learn how to capture malicious traffic on your network.
Updated: As promised, this course is constantly evolving, and we've just added an entirely new section! It covers Shims, and as always, you'll find: theory, a practical lab, and full access to the source code. Enjoy!
We will guide you step by step from Static to Dynamic Analysis, teaching you how to catch and examine our custom malware samples in your system and network!
You'll learn how to analyze, prevent, and code various types of malware, including Ransomware, Keyloggers, Injectors, malicious DLLs, Shims, and more.
Our labs are fully compatible with Windows 10 and 11.
This course is now part of the Sanru Online Academy and has been updated and re-edited for an enhanced learning experience.
This is a 100% interactive course.
We are committed to answering all your questions.
We are committed to keeping this course updated.
We are committed to adding new sections over time, making this course a living resource. This means you'll always have new malware samples to conduct your experiments on.
Did you know that the demand for Cybersecurity Researchers is increasing every year? And that this demand is not being met, with some of the highest salaries in the technology sector?
This course will teach you everything you need to kickstart your career as a Malware Analyst and pave your way into one of the most well-paid sectors in cybersecurity.
Based on the premise: "You can't analyze what you don't understand," we provide full malware source code (proof of concept). We'll guide you through our malware samples (Injectors, malicious DLLs, Keyloggers, and Ransomware) line by line.
Using our own malware samples, we will teach you stealth techniques, obfuscation, armoring, and persistence.
Even if you're not a beginner, you will still enjoy and gain valuable knowledge by analyzing our malware code and following the technical explanations.
This course was designed by experienced malware analysts, cybersecurity researchers, and academics. It is meant to be didactic and easy to follow, packed with resources that you'll find in the corresponding sections.
So far, we've added these resources (with more to come):
Rams1: A Ransomware malware sample (full code provided for academic purposes).
DecryptRams1: Software to decrypt files encrypted by Rams1 (full code provided for academic purposes).
Ransomware Help: A document to assist you if you get infected.
TotalAware2: A Keylogger that can steal Facebook credentials and connect to a Command and Control Center (full code provided for academic purposes).
TotalAware3: A Keylogger written in C++ (full code provided for academic purposes).
Injector7: Injects malicious code into a legitimate Windows process (full code provided for academic purposes).
Dll4: A malware sample coded in a DLL (full code provided for academic purposes).
Dll8: Demonstrates how to use export functions in a DLL (full code provided for academic purposes).
Practices: A document containing the lab exercises guide.
Lab Requirements and Quick Guide: A document to help you set up a safe lab for malware analysis.
Web Resources: A document with web pages we’ll use throughout the course.
CriticalPatchWin1.0: A malware sample designed to trick users into downloading malware (full code provided for academic purposes).
A quick note: Crackers are unwelcome! We are the good guys. Our malware samples are not meant to be weaponized.
What you’ll learn:
How to analyze, prevent, and code Ransomware (proof of concept). Source code provided for academic purposes.
How to analyze, prevent, and code a Keylogger that hides in legitimate Windows processes (proof of concept). Source code provided for academic purposes.
How to analyze, prevent, and code a Keylogger with a filter to steal Facebook credentials (proof of concept). Source code provided for academic purposes.
How to analyze, prevent, and code an Injector to infect legitimate Windows processes (proof of concept). Source code provided for academic purposes.
How to analyze, prevent, and code a malicious DLL (proof of concept). Source code provided for academic purposes.
How to set up a test lab to safely analyze malware.
How to differentiate between different types of malware, their behaviors, attack vectors, prevention techniques, and more.
How malware infects your system and its life cycle.
The main components of malware: payload, obfuscation, persistence, stealth, and armoring.
How malware connects to a Command and Control Center and its function.
How to gather Indicators of Compromise (IoCs) from infected systems.
How to analyze malware that tricks users into downloading it.
How to capture malware on your operating system.
How to capture malicious traffic on your network.
Course Requirements:
Basic computer and programming knowledge (in any language) is recommended but not mandatory.
Who is this Course For?
Beginners who want to pursue a lucrative career as Malware Analysts or Cybersecurity Researchers.
Malware enthusiasts and cybersecurity researchers looking to deepen their knowledge of cyber threats.