Malware Analysis with Ghidra | TryHackMe Advanced static analysis

Опубликовано: 22 Август 2024
на канале: Motasem Hamdan | Cyber Security & Tech
498
31

We covered an overview of malware analysis, starting with basic static analysis and moving through to advanced static analysis techniques such as reverse engineering and finishing with dynamic analysis. The focus of this tutorial was on the methodology an analyst should follow when reverse engineering a binary sample. Things to look for during this phase are strings, Windows API calls, exports and DLLs, function calls and execution flow. We covered few samples and analyzed them using the popular dissassembler “Ghidra” and also solved a practical scenario from TryHackMe Advanced static analysis which is part of SOC level 2 track.




****
Receive Cyber Security Field, Certifications Notes and Special Training Videos

******
Writeup

TryHackMe Advanced static analysis

********
Google Profile

LinkedIn
[1]:
[2]:
Instagram

Twitter

Facebook