Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Mastering Reverse Engineering & Malware Analysis
1. Disassembly and Disassembler
2. Disassembly - What (4:44)
1. The Disassembly Theory (2:25)
2. Binary Analysis
1. Analysis of Binary and 4 Stages of Compilation (5:58)
2. Preprocessing (8:02)
3. Compilation Phase (5:02)
4. Assembly Phase (4:24)
5. Linking Phase (6:37)
3. Linux - ELF Format
2. Learning ELF Fields (12:12)
1. Exploring the Executable and Linkable Format (ELF) and Executable Header (13:42)
3. Learning ELF Program Header Fields (14:34)
4. Windows - PE Format
1. Fundamentals of Windows PE Format (17:53)
5. Symbols, Stripped and Not Stripped Binaries
2. Revealing Contents of Object File (10:43)
1. Using READELF for Viewing Symbolic Information (6:46)
3. Trying to Analyze Binary Executable (8:56)
4. How binary loads and executes in theory (6:57)
6. Reverse Engineering and Malware Analysis - Installing Ghidra
1. Downloading Ghidra and File Structure (11:01)
2. Installing JDK in Linux (3:14)
3. Installing JDK in Windows or MacOS (3:51)
4. Installing SASM (9:48)
7. Writing our first 64Bit Assembly Program
1. Hello world with makefile (19:22)
2. Why nasm is best and compare assemblers (3:06)
3. Sticking to traditions - Hello world program without makefile (11:44)
8. Understanding Data Types
2. Converting Decimal to Binary with Basic Math (11:10)
1. Understanding CPU architectures and Binaries (3:29)
9. Debugging x86-64
2. Debugging and Finding Variables in Memory addresses (11:07)
1. Starting gdb and setting flavors (9:21)
3. Learning more with GDB (10:28)
10. Writing our second 64Bit Assembly Program
1. Coding ASM file (12:03)
2. Analyzing Output with GDB and creating makefile (17:09)
11. OR XOR AND
2. NOT (4:37)
1. The OR (6:34)
3. XOR (6:42)
4. AND (7:34)
12. Data Display Debugger - DDD
1. Developing another Assembly Program to Analyze with DDD (11:59)
2. Analyzing Previously Written Code (9:49)
3. Using DDD and Analyzing RAX Values (15:52)
13. Jump and Loop
1. Using Conditions and Jumping (17:30)
2. Jump if equal (5:52)
3. Jump if Not Equal (4:06)
4. Jump if Greater (7:52)
5. Greater than or Equal to (7:40)
6. Jump if Less (7:43)
7. Jump if less or equal (9:59)
8. Jump if Above (11:00)
9. Jump if Above or Equal (9:12)
10. Jump if below (9:48)
11. Jump if below or equal (8:58)
14. Assembly Project using Jump and Loop
2. Testing our Project (11:52)
1. Developing Loop and Calculator Project with Assembly (8:04)
15. Memory Manipulation
1. Project EXABYTE (23:56)
2. Testing and Analyzing Project with Readelf and GDB (21:33)
16. Calculator with Assembly
2. Addition and Subtraction (11:19)
1. Defining variables (12:40)
3. Last Decorations (16:36)
4. Explaining Registers in Practice (11:00)
5. Completing Section (10:20)
17. Starting with Ghidra
2. Discovering Ghidra (9:04)
1. Opening project in Ghidra (14:24)
18. Malware Analysis and Reverse Engineering with Ghidra
2. Analyzing Suspicious String using Ghidra (11:07)
1. Starting Real Malware Analysis with Ghidra (7:54)
3. OSINT for Reverse Engineering (5:41)
4. Analyzing Libraries that Malware Uses (3:12)
5. Extracting SYS file from Malware (11:46)
6. Finding Entry Points and Changing Undefined Function Names (4:50)
19. IDA Pro IDA Freeware
1. Downloading and Installing IDA Pro _ IDA Freeware (8:49)
2. Being friends with IDA (8:27)
3. Useful Tabs in IDA (7:13)
Teach online with
2. Disassembly - What
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock