Reverse Engineering

This course covers reverse engineering, and provides students with the knowledge & practical training needed to excel at one of the most desired skills in hacking. The course teaches students about malware activity, and how to bypass limitations, such as antidebugging and VM detection techniques.

Lessons in the course provide in-depth coverage of the many methods used in reverse engineering. Topics include Assembly language, CPU & RAM architecture, malware disassembly & debugging, program patching, anti-debugging, and VM detection. This course features hands-on simulations provided by @Cywar – a gamified training and assessment platform by HackerU Solutions.

Category:

Description

Prerequisites:
-Working knowledge of Windows OS, Linux OS, and information security
-Programing background in C, Python, or Java

Module-1:
Hello Assembly
-What is Assembly
-CPU architecture
-Registers types & structure
-Commands in RAM & RAM’s structure
-Stack & Heap
-Comparisons – cmp, zf instructions
-Basic C
-Introduction to IDA

Module-2:
Malware Disassembly
-IDA overview
-Jumping between display
-Code-flow analysis
-Code segments
-Variables identifications
-Arithmetic identification
-Conditions identification

Module-3:
Malware Debugging
-Debugging process
-Software & Breakpoint
-ollyDBG overview
-Following the stack
-Stepping

Module-4:
Patching & Anti-Debugging
-Combined analysis
-Runtime manipulation
-Changing code-flow
-Patching

Datasheets

  • Datasheet 1

Video



Categories


Partners: HackerU


Available Training: HackerU Offensive Cybersecurity