Reverse Engineering
This course covers reverse engineering, and provides students with the knowledge & practical training needed to excel at one of the most desired skills in hacking. The course teaches students about malware activity, and how to bypass limitations, such as antidebugging and VM detection techniques.
Lessons in the course provide in-depth coverage of the many methods used in reverse engineering. Topics include Assembly language, CPU & RAM architecture, malware disassembly & debugging, program patching, anti-debugging, and VM detection. This course features hands-on simulations provided by @Cywar – a gamified training and assessment platform by HackerU Solutions.
Description
Prerequisites:
-Working knowledge of Windows OS, Linux OS, and information security
-Programing background in C, Python, or Java
Module-1:
Hello Assembly
-What is Assembly
-CPU architecture
-Registers types & structure
-Commands in RAM & RAM’s structure
-Stack & Heap
-Comparisons – cmp, zf instructions
-Basic C
-Introduction to IDA
Module-2:
Malware Disassembly
-IDA overview
-Jumping between display
-Code-flow analysis
-Code segments
-Variables identifications
-Arithmetic identification
-Conditions identification
Module-3:
Malware Debugging
-Debugging process
-Software & Breakpoint
-ollyDBG overview
-Following the stack
-Stepping
Module-4:
Patching & Anti-Debugging
-Combined analysis
-Runtime manipulation
-Changing code-flow
-Patching