0% found this document useful (0 votes)
42 views

Reverse Engineering Malware Analysis

Malware Analysis detailed

Uploaded by

Saurabh Joshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

Reverse Engineering Malware Analysis

Malware Analysis detailed

Uploaded by

Saurabh Joshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Reverse Engineering

Course Content:
Module:1 - Introduction
1.1 Introduction to reverse engineering
1.2 Applications of reverse engineering

Module:2 - Assembly Language


2.1 Introduction
2.2 Compilers
2.3 Registers
2.4 Data Structures
2.5 Binary Executables
2.6 IA - 32 Processor Architecture
2.7 Windows Architecture

Module:3 - Reversing Tools


3.1 Offline and Live Code Analysis
3.2 Disassemblers
3.3 Debuggers
3.4 Decompilers
3.4 Classification Tools
3.5 Summary Tools
3.6 System Monitoring Tools
Module:4 - Starting with IDA
4.1 Introduction to IDA
4.2 Launching and Loading IDA
4.3 IDA database files
4.4 IDA GUI
4.5 IDA tips and tricks
4.6 IDA Data Displays

Module:5 - IDA implementation in Reverse Engineering


5.1 Vulnerability Analysis
5.2 Password Recovery
5.3 IDA Scripting

Module:6 - Reverse Engineering in Action


6.1 Debugging
6.2 Anti - Reversing

You might also like