Black Hat Edition
MANDIANT july 21-22 july 23-24
Ends February 1
Ends June 1
Ends July 20
Almost every computer incident involves a trojan, backdoor, virus, or rootkit. Incident responders must be able to perform rapid analysis on the malware encountered in an effort to cure current infections and prevent future ones. This course provides a rapid introduction to the tools and methodologies used to perform malware analysis on executables found on Windows systems using a practical, hands-on approach. Students will learn how to find the functionality of a program by analyzing disassembly and by watching how it modifies a system and its resources as it runs in a debugger. They will learn how to extract host and network-based indicators from a malicious program. They will be taught about dynamic analysis and the Windows APIs most often used by malware authors. Each section is filled with in-class demonstrations and hands-on labs with real malware where the students practice what they have learned. Students will receive a FREE copy of the book, "Practical Malware Analysis" written by Mike Sikorski.
What You Will Learn
- Hands-on malware dissection
- How to create a safe malware analysis environment
- How to quickly extract network and host-based indicators
- How to perform dynamic analysis using system monitoring utilities to capture the file system, registry and network activity generated by malware
- How to debug malware and modify control flow and logic of software
- To analyze assembly code after a crash course in the Intel x86 assembly language
- Windows internals and APIs
- How to use key analysis tools like IDA Pro and OllyDbg
- What to look for when analyzing a piece of malware
- The art of malware analysis; not just running tools
Who Should Attend the Class
Software developers, information security professionals, incident responders, computer security researchers, puzzle lovers, corporate investigators or others requiring an understanding of how malware works and the steps and processes involved in performing malware analysis.
What to bring
Students must bring their own laptop with VMware Workstation, Server or Fusion installed (VMware Player is acceptable, but not recommended). Laptops should have at least 20GB of free space.
Students who cannot meet the laptop requirements because of onsite registration or other reasons may contact MANDIANT at firstname.lastname@example.org to see if a laptop can be provided for you.
What You Will Get
- A signed copy of "Practical Malware Analysis" from No Starch Press
- Student Manual
- Class handouts
- MANDIANT gear
- Excellent knowledge of computer and operating system fundamentals
- Computer programming fundamentals and Windows Internals experience is highly recommended
Steve Davis is a Principal Consultant in Mandiant's Alexandria, Virginia, office. He specializes in reverse engineering. Mr. Davis has developed both offensive and defensive software while at Mandiant and previous employers. He has also spoken at DEF CON, Black Hat and a variety of other security conferences.