Almost every computer incident involves a trojan, backdoor, virus, or rootkit. Incident responders must be able to perform rapid analysis on the malware encountered in an effort to cure current infections and prevent future ones. This course provides a rapid introduction to the tools and methodologies used to perform malware analysis on executables found on Windows systems using a practical, hands-on approach. Students will learn how to find the functionality of a program by analyzing disassembly and by watching how it modifies a system and its resources as it runs in a debugger. They will learn how to extract host and network-based indicators from a malicious program. They will be taught about dynamic analysis and the Windows APIs most often used by malware authors. Each section is filled with in-class demonstrations and hands-on labs with real malware where the students practice what they have learned. Students will receive a FREE copy of the book, "Practical Malware Analysis" written by Mike Sikorski.
Software developers, information security professionals, incident responders, computer security researchers, puzzle lovers, corporate investigators or others requiring an understanding of how malware works and the steps and processes involved in performing malware analysis.
Students must bring their own laptop with VMware Workstation, Server or Fusion installed (VMware Player is acceptable, but not recommended). Laptops should have at least 20GB of free space.
Students who cannot meet the laptop requirements because of onsite registration or other reasons may contact MANDIANT at firstname.lastname@example.org to see if a laptop can be provided for you.
Steve Davis is a Principal Consultant in Mandiant's Alexandria, Virginia, office. He specializes in reverse engineering. Mr. Davis has developed both offensive and defensive software while at Mandiant and previous employers. He has also spoken at DEF CON, Black Hat and a variety of other security conferences.