• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Reverse Engineering Reverse Engineering Ransomware

Status
Not open for further replies.

Big Data

Initiate
User
Joined
Jan 26, 2019
Messages
44
Reputation
0
Reaction score
40
Points
18
Credits
0
‎6 Years of Service‎
88%
maxresdefault.jpg


Description
ـــــــــــــــــــــــــ
The aim of this course is to provide a practical approach to analyzing ransomware. Working with real world samples of increasing difficulty, we will:

Deep dive into identifying the encryption techniques,

Navigate through various evasion tricks used by malware writers,

Have fun discovering flaws in their logic or the implementation and

Work out automated ways to recover the affected files.

If you're already familiar with the basics and want to dive straight into advanced samples, navigate anti-virtualisation and anti-analysis tricks, and write C and Python decryptors for custom crypto algorithms,  please check out our Advanced Reverse Engineering Ransomware course!

Requirements
ــــــــــــــــــــــــــــــــ
-Basic programming knowledge
-A computer that can run a Windows virtual machine.
-An interest in disassembling things and understanding how they work!
-Patience and perseverance to “try harder”.

Who this course is for:
ــــــــــــــــــــــــــــــــــــــــــــــــــــ
-Security testers
-Malware analysts
-Forensics investigators
-System administrators
-Information security students
-Anyone interested in ransomware and malware analysis

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top