Linux Reverse Engineering via Malware Analysis
5-day Advanced Level Course
Target Audience: Security personnel with practical experience, C/C++/Assembly developers, Security Researchers, anyone interested in significantly increasing their debugging skills.
In order to understand what an unknown binary or firmware does, what are application vulnerabilities and possibly how to exploit them, one would usually have to either see what the developer sees (source code) or what the target processor sees (binary code).
In this course we will focus on the latter, trying to understand what a program does when its source code is not available.
We will examine methods to retrieve as much information as we can from the program’s memory layout, including how it was built, whether it has incorporated anti-debugging techniques, and will practice practical ways of obtaining behavioral information, assessing a program’s security or intended insecurity, and learn the tools and disciplines of effectively reverse engineering software via Malware Analysis.
While security oriented, the course will be extremely beneficial for anyone who want to significantly increase their debugging skills.
The course is targeted towards Linux/X86_64 platforms and can be customized to any other operating system and architecture (MacOS, Linux, Windows, x86, x86_64, MIPS, PowerPC).