Skip to content
Cysinfo
  • Training
  • Meetups
    • Meetup Talks
  • Videos
  • Articles
  • Mentorship
  • Tools
  • Events
    • Upcoming
    • Past
  • Law & Policy
  • About
    • About Cysinfo
    • Our Team
    • Our Associations
  • Contact Us

Training

  • Training
  • Meetups
    • Meetup Talks
  • Videos
  • Articles
  • Mentorship
  • Tools
  • Events
    • Upcoming
    • Past
  • Law & Policy
  • About
    • About Cysinfo
    • Our Team
    • Our Associations
  • Contact Us

Facebook

0

Session 2: Botnet Analysis – Part 1

10 years ago

This session will discuss some stealth techniques used by malwares and also demonstrates some rapid reversing techniques to accelerate the reversing tasks. Video Demo

Advanced Malware Analysis, Videos
1
2

Session 1: Detection and Removal of Malwares

10 years ago

This session will introduce you with some tools and tricks to identify and remove malwares from the infected system.   [Note: View the video in 720HD quality] Demo Video 1 Demo Video 2 Demo Video 3 Demo Video 4  

Advanced Malware Analysis, Videos
0
9

Session 12 – Case Study: Rootkit Analysis

10 years ago

This session covered the concept of rootkit and demonstrated some of the techniques used by the rooktits.   Demo Video 1: Mader – SSDT Hooking  Demo Video 2: Prolaco – Process Hiding using DKOM Demo Video 3: Darkmegi/waltrodock – Installs Device Driver  Demo Video 4: Carberp – Syscall Patch and Inline Hooks

Malware Analysis, Videos
0
2

Session 11 – Practical Reversing Part VI – Exploit Development [advanced]

10 years ago

This session discussed some of the protections added by the operating system and processors to mitigate the exploitation, and also presented some ways to bypass those protections.   DemoVideo 1: Heap Spray  DemoVideo 2: Bypassing DEP  

Malware Analysis, Videos
0
2

Session 10 – Practical Reversing Part V – Exploit Development [basic]

10 years ago

This session covered the basic techniques of exploitation, some of these techniques may not work on latest operating system due various protections added into them. But these techniques are very crucial to understand the basic nature of exploit     Demo Video 1: EIP Overwrite Demo Video 2: SEH Overwrite

Malware Analysis, Videos
0
9

Session 9 – Practical Reversing Part IV – Basic & Advanced Malware Analysis

10 years ago

This session covered the concept of basic and advanced malware analysis.   Video Demo   Demo Video 1: Basic Malware Analysis   Demo Video 2: Advanced Malware Analysis

Malware Analysis, Videos
1
10

Session 8 – Practical Reversing Part III – Malware Memory Forensics

10 years ago

Memory forensics is an investigation technique which involves examining the computer’s memory for forensic artifacts. This presentation covers the concept of memory forensics and shows how to perform memory forensics using an investigation scenario.   Video Demo

Malware Analysis, Videos
0
2

Session 7 – Practical ReversingPart II – Unpacking Malware

10 years ago

In reverse engineering understanding cryptographic functions and packers are the two most challenging and sophisticated tasks. In real life virtually all malwares use some form of packing so understanding packing/unpacking is one of the most important task in malware analysis. Check the reference section for additional material. We highly recommend Lena151 (see reference) material for […]

Malware Analysis, Videos
0
1

Session 6 – Practical Reversing Part I – Basic Reversing

10 years ago

This session covers the concept of basic Reverse engineering. Malwares most of time uses packers and cryptors to thwart the analysis efforts, so it becomes important to understand the concept of unpacking. This presentation covers the concept of packer and a demo showing unpacking of packer called UPX.     Video Demo

Malware Analysis, Videos
0
2

Session 5 – Reverse Engineering Basics and Tool Guide

10 years ago

Reverse engineering tools are essential in understanding the functionality and the inner workings of a binary. The presentation covers the concept of some of the commonly used reverse engineering tools.

Malware Analysis
0

Posts navigation

Older posts
Newer posts

Posts navigation

Load More Posts

Subscribe to our mailer list.

Subscribe

    Categories

    • Advanced Malware Analysis 11
    • Articles 23
    • Events 4
    • Law & Policy 3
    • Malware Analysis 13
    • Meetup Talks 65
    • Meetups 14
    • Past Events 13
    • Tools 11
    • Training 0
    • Upcoming Events 1
    • Videos 33
    Copyright © 2025 Cysinfo.com. All Rights Reserved