SlideShare a Scribd company logo
www.SecurityXploded.com
Disclaimer
The Content, Demonstration, Source Code and Programs presented here
is "AS IS" without any warranty or conditions of any kind. Also the
views/ideas/knowledge expressed here are solely of the trainer’s only and
nothing to do with the company or the organization in which the trainer is
currently working.

However in no circumstances neither the trainer nor SecurityXploded is
responsible for any damage or loss caused due to use or misuse of the
information presented here.




                              www.SecurityXploded.com
Acknowledgement
 Special thanks to null & Garage4Hackers community for their extended
  support and cooperation.
 Thanks to all the trainers who have devoted their precious time and
  countless hours to make it happen.




                               www.SecurityXploded.com
Reversing & Malware Analysis Training

This presentation is part of our Reverse Engineering & Malware
Analysis Training program. Currently it is delivered only during our local
meet for FREE of cost.




For complete details of this course, visit our Security Training page.


                              www.SecurityXploded.com
Who am I #1
Amit Malik (sometimes DouBle_Zer0,DZZ)
     Member SecurityXploded & Garage4Hackers
     Security Researcher
     RE, Exploit Analysis/Development, Malware Analysis
     Email: m.amit30@gmail.com




                            www.SecurityXploded.com
Who am I #2
Swapnil Pathak
      Member SecurityXploded
      Security Researcher
      RE, Malware Analysis, Network Security
      Email: swapnilpathak101@gmail.com




                         www.SecurityXploded.com
Introduction
   This Guide is specific to our course

   Although it will cover most of the tools and techniques for
    an analysis environment

   Our main focus is on the famous tools




                              www.SecurityXploded.com
Virtualization
   Run multiple OS on the single hardware at the same time.

   Advanced functionalities like Snapshot, Revert Back, pause
    etc.

   Automation

   Controlled environment




                             www.SecurityXploded.com
Virtualization Tools
   VmWare (Commercial)

   VirtualBox (Open Source – free)

   Images – XpSp2, XpSp3




                            www.SecurityXploded.com
VmWare Image




    www.SecurityXploded.com
VirtualBox Image




      www.SecurityXploded.com
Tools Development
   Compiler/IDE
     Dev C++ (Free) - preferred

     Microsoft Visual C++ (Commercial)

   Assemblers
     MASM (Free) -preferred

     NASM (Free)

     Winasm (IDE) (Free)

   Interpreters
     Python (Free)



                            www.SecurityXploded.com
Tools Reverse Engg.
   Disassembler:

     IDA Pro (Download free version)

   Debuggers

     Ollydbg

     Immunity Debugger

     Windbg

     Pydbg (optional)




                          www.SecurityXploded.com
Tools Reverse Engg. Cont.
   PE file Format
     PEview, PEbrowse, LordPE, ImpRec, Peid, ExeScan

   Process Related
     ProcMon, Process explorer

   Network Related
     Wireshark, TcpDump, Tshark, TCPView

   File, Registry Related
     Regshot, filemon, InstallwatchPro, CaptureBat



                             www.SecurityXploded.com
Tools Reverse Engg. Cont.
   Misc.

     CFFExplorer, Notepad++, Dependency Walker,
      Sysinternal tools

   If something additional is required then we will cover that in
    the respective lecture




                              www.SecurityXploded.com
Reference
   Complete Reference Guide for Reversing & Malware
    Analysis Training




                           www.SecurityXploded.com
Thank You !



www.SecurityXploded.com

More Related Content

What's hot (20)

PPTX
Reversing & malware analysis training part 2 introduction to windows internals
securityxploded
 
PPTX
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
securityxploded
 
PPTX
Reversing & malware analysis training part 3 windows pe file format basics
securityxploded
 
PPTX
Primer on password security
securityxploded
 
PPTX
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
securityxploded
 
PPTX
Reversing & Malware Analysis Training Part 13 - Future Roadmap
securityxploded
 
PPTX
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
securityxploded
 
PPTX
Advanced Malware Analysis Training Session 8 - Introduction to Android
securityxploded
 
PPTX
Anatomy of Exploit Kits
securityxploded
 
PPTX
Application Virtualization
securityxploded
 
PPTX
Advanced malware analysis training session 7 malware memory forensics
Cysinfo Cyber Security Community
 
PPTX
Advanced malwareanalysis training session2 botnet analysis part1
Cysinfo Cyber Security Community
 
PPTX
Reversing malware analysis training part11 exploit development advanced
Cysinfo Cyber Security Community
 
PPTX
Reversing malware analysis training part7 unpackingupx
Cysinfo Cyber Security Community
 
PPTX
Advanced malware analysis training session5 reversing automation
Cysinfo Cyber Security Community
 
PPTX
Defeating public exploit protections (EMET v5.2 and more)
securityxploded
 
PPTX
Reversing malware analysis training part6 practical reversing
Cysinfo Cyber Security Community
 
PPTX
Hunting Rootkit From the Dark Corners Of Memory
securityxploded
 
PPTX
Advanced malware analysis training session8 introduction to android
Cysinfo Cyber Security Community
 
PPTX
Reversing & Malware Analysis Training Part 6 - Practical Reversing (I)
securityxploded
 
Reversing & malware analysis training part 2 introduction to windows internals
securityxploded
 
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
securityxploded
 
Reversing & malware analysis training part 3 windows pe file format basics
securityxploded
 
Primer on password security
securityxploded
 
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
securityxploded
 
Reversing & Malware Analysis Training Part 13 - Future Roadmap
securityxploded
 
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
securityxploded
 
Advanced Malware Analysis Training Session 8 - Introduction to Android
securityxploded
 
Anatomy of Exploit Kits
securityxploded
 
Application Virtualization
securityxploded
 
Advanced malware analysis training session 7 malware memory forensics
Cysinfo Cyber Security Community
 
Advanced malwareanalysis training session2 botnet analysis part1
Cysinfo Cyber Security Community
 
Reversing malware analysis training part11 exploit development advanced
Cysinfo Cyber Security Community
 
Reversing malware analysis training part7 unpackingupx
Cysinfo Cyber Security Community
 
Advanced malware analysis training session5 reversing automation
Cysinfo Cyber Security Community
 
Defeating public exploit protections (EMET v5.2 and more)
securityxploded
 
Reversing malware analysis training part6 practical reversing
Cysinfo Cyber Security Community
 
Hunting Rootkit From the Dark Corners Of Memory
securityxploded
 
Advanced malware analysis training session8 introduction to android
Cysinfo Cyber Security Community
 
Reversing & Malware Analysis Training Part 6 - Practical Reversing (I)
securityxploded
 

Similar to Reversing & malware analysis training part 1 lab setup guide (20)

PDF
Reversing & malware analysis training part 1 lab setup guide
Abdulrahman Bassam
 
PPTX
Reversing malware analysis training part1 lab setup guide
Cysinfo Cyber Security Community
 
PDF
Reversing & malware analysis training part 9 advanced malware analysis
Abdulrahman Bassam
 
PDF
Reversing & malware analysis training part 5 reverse engineering tools basics
Abdulrahman Bassam
 
PDF
Reversing & malware analysis training part 12 rootkit analysis
Abdulrahman Bassam
 
PDF
Reversing & malware analysis training part 2 introduction to windows internals
Abdulrahman Bassam
 
PDF
A client-side vulnerability under the microscope!
Nelson Brito
 
PPTX
Malware 101 by saurabh chaudhary
Saurav Chaudhary
 
PDF
Reversing & malware analysis training part 8 malware memory forensics
Abdulrahman Bassam
 
PDF
Advanced Malware Analysis Training - Detection and Removal of Malwares
n|u - The Open Security Community
 
PPTX
Basic malware analysis
securityxploded
 
PPTX
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
lior mazor
 
PPTX
Basic malware analysis
Cysinfo Cyber Security Community
 
PDF
Reversing and Malware Analysis
E Hacking
 
PDF
Inception: A reverse-engineer horror History
Nelson Brito
 
PDF
Malware Analysis -an overview by PP Singh
n|u - The Open Security Community
 
PDF
'Malware Analysis' by PP Singh
Bipin Upadhyay
 
PDF
Malware analysis and detection using reverse Engineering, Available at: www....
Research Publish Journals (Publisher)
 
PDF
Reversing Engineer: Dissecting a "Client Side" Vulnerability in the APT era
Nelson Brito
 
PDF
Intro2 malwareanalysisshort
Vincent Ohprecio
 
Reversing & malware analysis training part 1 lab setup guide
Abdulrahman Bassam
 
Reversing malware analysis training part1 lab setup guide
Cysinfo Cyber Security Community
 
Reversing & malware analysis training part 9 advanced malware analysis
Abdulrahman Bassam
 
Reversing & malware analysis training part 5 reverse engineering tools basics
Abdulrahman Bassam
 
Reversing & malware analysis training part 12 rootkit analysis
Abdulrahman Bassam
 
Reversing & malware analysis training part 2 introduction to windows internals
Abdulrahman Bassam
 
A client-side vulnerability under the microscope!
Nelson Brito
 
Malware 101 by saurabh chaudhary
Saurav Chaudhary
 
Reversing & malware analysis training part 8 malware memory forensics
Abdulrahman Bassam
 
Advanced Malware Analysis Training - Detection and Removal of Malwares
n|u - The Open Security Community
 
Basic malware analysis
securityxploded
 
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
lior mazor
 
Basic malware analysis
Cysinfo Cyber Security Community
 
Reversing and Malware Analysis
E Hacking
 
Inception: A reverse-engineer horror History
Nelson Brito
 
Malware Analysis -an overview by PP Singh
n|u - The Open Security Community
 
'Malware Analysis' by PP Singh
Bipin Upadhyay
 
Malware analysis and detection using reverse Engineering, Available at: www....
Research Publish Journals (Publisher)
 
Reversing Engineer: Dissecting a "Client Side" Vulnerability in the APT era
Nelson Brito
 
Intro2 malwareanalysisshort
Vincent Ohprecio
 
Ad

More from securityxploded (20)

PPTX
Fingerprinting healthcare institutions
securityxploded
 
PDF
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
securityxploded
 
PDF
Buffer Overflow Attacks
securityxploded
 
PPTX
Malicious Client Detection Using Machine Learning
securityxploded
 
PDF
Understanding CryptoLocker (Ransomware) with a Case Study
securityxploded
 
PDF
Linux Malware Analysis using Limon Sandbox
securityxploded
 
PPT
Introduction to SMPC
securityxploded
 
PPTX
Breaking into hospitals
securityxploded
 
PPTX
Bluetooth [in]security
securityxploded
 
PPTX
Automating Malware Analysis
securityxploded
 
PPTX
Reverse Engineering Malware
securityxploded
 
PPTX
DLL Preloading Attack
securityxploded
 
PPTX
Partial Homomorphic Encryption
securityxploded
 
PPTX
Return Address – The Silver Bullet
securityxploded
 
PPTX
Hunting Ghost RAT Using Memory Forensics
securityxploded
 
PPTX
Malicious Url Detection Using Machine Learning
securityxploded
 
PPTX
MalwareNet Project
securityxploded
 
PPTX
Reversing and Decrypting the Communications of APT Malware (Etumbot)
securityxploded
 
PPTX
Dissecting BetaBot
securityxploded
 
PPTX
Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14
securityxploded
 
Fingerprinting healthcare institutions
securityxploded
 
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
securityxploded
 
Buffer Overflow Attacks
securityxploded
 
Malicious Client Detection Using Machine Learning
securityxploded
 
Understanding CryptoLocker (Ransomware) with a Case Study
securityxploded
 
Linux Malware Analysis using Limon Sandbox
securityxploded
 
Introduction to SMPC
securityxploded
 
Breaking into hospitals
securityxploded
 
Bluetooth [in]security
securityxploded
 
Automating Malware Analysis
securityxploded
 
Reverse Engineering Malware
securityxploded
 
DLL Preloading Attack
securityxploded
 
Partial Homomorphic Encryption
securityxploded
 
Return Address – The Silver Bullet
securityxploded
 
Hunting Ghost RAT Using Memory Forensics
securityxploded
 
Malicious Url Detection Using Machine Learning
securityxploded
 
MalwareNet Project
securityxploded
 
Reversing and Decrypting the Communications of APT Malware (Etumbot)
securityxploded
 
Dissecting BetaBot
securityxploded
 
Watering Hole Attacks Case Study and Analysis_SecurityXploded_Meet_june14
securityxploded
 
Ad

Recently uploaded (20)

PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
July Patch Tuesday
Ivanti
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 

Reversing & malware analysis training part 1 lab setup guide

  • 2. Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are solely of the trainer’s only and nothing to do with the company or the organization in which the trainer is currently working. However in no circumstances neither the trainer nor SecurityXploded is responsible for any damage or loss caused due to use or misuse of the information presented here. www.SecurityXploded.com
  • 3. Acknowledgement  Special thanks to null & Garage4Hackers community for their extended support and cooperation.  Thanks to all the trainers who have devoted their precious time and countless hours to make it happen. www.SecurityXploded.com
  • 4. Reversing & Malware Analysis Training This presentation is part of our Reverse Engineering & Malware Analysis Training program. Currently it is delivered only during our local meet for FREE of cost. For complete details of this course, visit our Security Training page. www.SecurityXploded.com
  • 5. Who am I #1 Amit Malik (sometimes DouBle_Zer0,DZZ)  Member SecurityXploded & Garage4Hackers  Security Researcher  RE, Exploit Analysis/Development, Malware Analysis  Email: [email protected] www.SecurityXploded.com
  • 6. Who am I #2 Swapnil Pathak  Member SecurityXploded  Security Researcher  RE, Malware Analysis, Network Security  Email: [email protected] www.SecurityXploded.com
  • 7. Introduction  This Guide is specific to our course  Although it will cover most of the tools and techniques for an analysis environment  Our main focus is on the famous tools www.SecurityXploded.com
  • 8. Virtualization  Run multiple OS on the single hardware at the same time.  Advanced functionalities like Snapshot, Revert Back, pause etc.  Automation  Controlled environment www.SecurityXploded.com
  • 9. Virtualization Tools  VmWare (Commercial)  VirtualBox (Open Source – free)  Images – XpSp2, XpSp3 www.SecurityXploded.com
  • 10. VmWare Image www.SecurityXploded.com
  • 11. VirtualBox Image www.SecurityXploded.com
  • 12. Tools Development  Compiler/IDE  Dev C++ (Free) - preferred  Microsoft Visual C++ (Commercial)  Assemblers  MASM (Free) -preferred  NASM (Free)  Winasm (IDE) (Free)  Interpreters  Python (Free) www.SecurityXploded.com
  • 13. Tools Reverse Engg.  Disassembler:  IDA Pro (Download free version)  Debuggers  Ollydbg  Immunity Debugger  Windbg  Pydbg (optional) www.SecurityXploded.com
  • 14. Tools Reverse Engg. Cont.  PE file Format  PEview, PEbrowse, LordPE, ImpRec, Peid, ExeScan  Process Related  ProcMon, Process explorer  Network Related  Wireshark, TcpDump, Tshark, TCPView  File, Registry Related  Regshot, filemon, InstallwatchPro, CaptureBat www.SecurityXploded.com
  • 15. Tools Reverse Engg. Cont.  Misc.  CFFExplorer, Notepad++, Dependency Walker, Sysinternal tools  If something additional is required then we will cover that in the respective lecture www.SecurityXploded.com
  • 16. Reference  Complete Reference Guide for Reversing & Malware Analysis Training www.SecurityXploded.com