Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Reverse Engineering All the Malware and Why You Should Stop

via YouTube

Overview

Explore the intricacies of malware reverse engineering and its future implications in this 55-minute conference talk from Derbycon 2016. Delve into Brandon Young's approach to malware reverse engineering, examining current trends and future prospects in the field. Learn about automation techniques, sandbox usage, and API utilization, with a focus on practical examples such as VirusTotal integration. Witness demonstrations of NetTraveler analysis and dynamic binary instrumentation. Gain insights into debugging scripts, export table navigation, and essential wisdom for aspiring reverse engineers. Conclude with a Q&A session to address lingering questions about this complex and evolving discipline.

Syllabus

Intro
RE telling me to stop doing RE?
Who is this talk for?
Outline
My Approach to Malware RE
Today and the future...
What's actually changed?
Automating some of the things...
So how do I do it?
Sandboxes cont...
API Usage Example: VT
Demo: NetTraveler...
Dynamic Binary Instrumentation
Debugging Scripts... Demo
IMAGE_EXPORT_DIRECTORY
Walking the Export Table...
Words of wisdom
Questions?

Reviews

Start your review of Reverse Engineering All the Malware and Why You Should Stop

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.