Have you ever looked at programs and wondered how they function? How do analyze and debug the operating system and malware? Found a bug, got infected by malware?
We will try to answer these questions with fun tasks while learning the methods, and tools we need in the process.
Training level: Intermediate; Basic
Day 1 - Basics
This day focuses on bringing each participant to the same level of comfort and understanding of the underlying systems
Day 2 - Warmup
Day 3 - Analysis - Static and Dynamic
This day focuses on solving various tasks involved during day-to-day malware/vulnerability analysis and acquiring intermediate skills needed to reverse engineer complex software.
This day will focus on tracing, scripting, automating the analysis, and writing your own tools.
Day 4 - Malware Analysis - Static and Dynamic
Working up from normal Reversing to bypassing novel techniques used by Malware. We will use the knowledge, tools, and techniques from the last day to figure out common traits of some malware.
Cyber Security Experts, Penetration Testers, Cyber Security Analysts, Malware Analysts
Expect your doubts about asm, memory, OS, linking, loading, and some compilers
Trainees can expect to learn about scripting various tools such as IDA, gdb, frida, etc.
Kernel Debugging, Software Development, Fuzzing
Sudhakar is an Engineer with the Spotlight team at CrowdStrike. He has 5+ years of experience in reversing, exploitation, CTFs, and software development. He is passionate about all things exploitation and maths. He is currently the chapter lead for Null - The Open Security Community Pune chapter. In the past, he has given talks at local Null meetups and BSides Delhi.