Understanding and combating malware is at the heart of much of today's infosec work, and today's trio of Black Hat USA 2014 Training highlights approach the topic from a couple different angles.
Trojans, backdoors, viruses, and rootkits are the elemental ingredients of most computer security incidents, so it's critical for responders to be able to rapidly analyze, contain, and cure them. Malware Analysis Crash Course: Black Hat Edition will give you a rapid introduction to the tools and techniques of Windows malware analysis. Learn how to reverse engineer and analyze disassembled code to see how a malware modifies a system, extract host- and network-based indicators, and which APIs malware authors use most frequently. This Training aims to teach the art of malware analysis, which is more than just running tools.
Speaking of reverse engineering, malware authors deliberately try to thwart others gaining access to their code. That's where Advanced Malware Analysis - Black Hat Edition aims to help. The Training will fill you in on the most-used obfuscation techniques and challenge you to defeat them in difficult, hands-on labs. Topics will include successfully unpacking malware, analyzing shellcode from malicious documents, automating analysis with ISA Pro, and how to defeat key defensive techniques like anti-debugging, anti-disassembly, and anti-vm.
Finally, let's flip the script and look at malware from the other side. In Hands-on Exploit Development you'll gain insight into Win32 exploit development by finding exploits, writing code to exploit them, and borrowing public code to meet your needs. The Training will start with basics like stack-based buffer overflows and move on to more advanced techniques like bypassing anti-exploitation measures such as stack cookies, ASLR, and DEP.
Ready to register? Early-bird rates are available until June 2. Please visit Black Hat USA 2014's registration page to get started.