Malware Reverse Engineering Courses
We offer state of the art malware reverse engineering courses focusing on static analysis with Ghidra.
After completing the first day of the course, each participant will be able to perform static reverse engineering of malware. Actual in-the-wild malware samples are analyzed in hands-on exercises to exemplify general concepts and challenges, which are usually related to anti-analysis techniques.
Classes can include a wide variety of topics such as analysis of malicious documents, other binary formats, scripting and automation of Ghidra, more advanced obfuscation techniques, object oriented code, as well as dynamic analysis. The precise selection of topics is highly customizable depending on your requirements.
We have outlined an example schedule below which has a strong focus on the Ghidra decompiler. This way, we can avoid a prolonged introduction to x86 assembly and give ad-hoc treatments only when it arises naturally during analysis. The only requirement for such a course is a solid understanding of the C programming language, notably including pointer arithmetic.
Since the pace and contents of the course are tailored to your needs, so is the price. Contact kapluenf@email@example.com for details.
We are study buddies with a background in Mathematics and Computer Science and currently work at CrowdStrike as malware reverse engineers.
Both of us are experienced teachers and have regularly taught as a team since 2008.
Day 1: Orientation
- First steps with Ghidra
- Analysis of an unobfuscated malware sample
- Overcoming string obfuscation
- Reverse engineering paradigms
Day 2: Anti-Analysis Strategies, Part 1
- Packed malware
- Control flow obfuscation
- Position-Independent code
- The Portable Executable (PE) format
- Dynamic API resolution
- Stack Strings
- Data structures (structs)
- Compression Algorithms
Day 3: Anti-Analysis Strategies, Part 2
- Cryptographic Algorithms
- API Hashing
- Ghidra Scripting
Day 4 (Optional): Object Oriented Code
Day 5 (Optional): Dynamic Analysis
- Behavioural Analysis
- Rudimentary VM Hardening
- API Tracing
- Dynamic Unpacking