0% found this document useful (0 votes)
289 views3 pages

Int251 Malware Analysis and Cyber Defence

Uploaded by

lamiaz7888
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
289 views3 pages

Int251 Malware Analysis and Cyber Defence

Uploaded by

lamiaz7888
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
INT251:MALWARE ANALYSIS AND CYBER DEFENCE L:2 Tso P:2 Credits:3 Course Outcomes: — Through this course students should be able to unit £ Unit 1 unit mr unit 1v unit v unit vi List of Practicals / Experiments: C01 :: understand major defense strategies to secure operation centers C02 :; analyze the behavior of the malware and its interaction with the system C03 =: gain the basics of assembly Language and the necessary skills required to perform code analysis C04 :: analyze the lth techniques used by advanced malware to hide from Forensic tools COS #: apply the malware forensic techniques to Investigate advanced malware CO6 :: identify major defense strategies to secure operation centers Introduction to malware analysis : Introduction to malware, types of malware, malware analysis, pes of malware analysis, Static Analysis : determining file type, fingerprinting malware, multiple anti-virus scanning, extracting strings, determining file obfuscation, Inspecting PE header information, Comparing and classifying malware Dynamic Analysis : dynamic analysis steps, analysing malware, DLL analysis Assembly language and disassembly primer : Introduction to assembly language basics, registers, data transfer instructions, arithmetic operations, bitwise operations, branching and Conditionals, loops and Functions, arrays and strings, structures and x64 architecture Disassembly using IDA : static code analysis, dissembling Windows API Debugging malicious Binaries : general concepts of debugging, debugging binaries Malware function: ities and persistence : malware functionalities, malware persistence methods Code Injection and Hooking : virtual memory, user mode and kernel mode, code injection techniques, hooking techniques Malware Obfuscation Techniques : simple encoding, malware encryption, custom encoding, malware unpacking Hunting Malware using Malware Forensics : memory forensics steps, memory acquisition, volatlity overview, enumerating processes, listing process handles, dumping executable and DLL, listing network connections and Sockets, inspecting registry, investigating service, extracting command history, listing DLL's Detecting advanced malware using memory forensics : detecting code Injection, investigating hollow process injection, detecting API hooks, kernel mode rootkits, listing kernel modules, 1/0 processing, display device tress, detecting kernel space hooking, kernel call-backs and timers Security Operation Center : Major defense strategies, Importance of SOC, SIEM, Importance of SIEM, Case studies pertaining to SOC Identifying file type using manual method ‘+ manual file identification using various methods Identifying file type using tools + CFF explorer + Determining file type using python Session 2023-24 Page:t/3 Fingerprinting the malware + Generating cryptographic hash using tools + Determining cryptographic hash in python String extraction using tools + Decoding obfuscated strings using FLOSS Determining file obfuscation + packers and cryptors Detecting and inspecting pe and exports + Detecting inspectingpe header information file obfuscation using exeinfo pe + inspecting file dependencies and imports + inspecting exports + examining pe sectiontable and sections + examining the compilation timestamp + examining pe resources Comparing and classifying the malware + classifying malware using fuzzy hashing + classifying malware using import hash + classifying malware using section hash + classifying malware using yara Dynamic analysis method + process inspection with process hacker + determining system interaction with process monitor + logging system activities using noriben + capturing network traffic with wireshark + simulating services with inetsim Analyzing a malware executable + static analysis of the sample + dynamic analysis of the sample Dynamlc-Link Library (DLL) analysis + analyzing the dil using rundli32.exe + analyzing a dll with no exports + analyzing a dll with exports + analyzing a dil accepting export arguments + anatyzing a dil with process checks Assembly and disassembly on disk + analyzing the program on disk + program disassembly(from machine code to assembly cade) + analyzing 32-bit executable on 64bit windows Static code analysis disassembly using IDA + loading binary In ica + improving disassembly using ida Session 2023-24 Page:2/3 References: Disassembling windows API + understanding windows api + windows api 32-bit and 64-bit comparison Patching binary using IDA + patching program bytes + patching instructions IDA scripting and plugins + executing ida scripts + ida python + ida plugin Malicious binaries dubugging + debugging a binary using x64dbg + debugging a malicious dil using x64cb9 Debugging a binary using IDA + debugging malware executables + debugging a malicious dil using ide + debugger seripting using idapython + determining fles accessed by malware 1, LEARNING MALWARE ANALYSIS by MONNAPPA K A, PACKT PUBLISHING Session 2023-24 Page:3/3

You might also like