Wednesday, July 28, 2010

TRAINING: Modern Malware Reverse Engineering

ESET, one of the worldwide leaders in the fight against evil software, brings the most innovational training in the area.

Check here for further information.

Modern Malware Reverse Engineering

- Basic unpacking (examples with FSG and ASPack)
- Basis of static analysis
- Control Flow analysis
- Data analysis
- Function and cross references
- IDA tips and tricks
- Basic modern malware analysis
- Typical infection vectors, how to spot them in a binary
- Typical installation mechanism and how to spot them in a binary
- Typical payloads and how to spot them in a binary
- Complete example of bot infection, from malicious javascript to installed malware
- Example of complex malware analysis, starting from semi automated de-obfuscation with final binary analysis

Every section of the training will have a technical introduction and review, and there will be hands-on exercises by the end of it.

The training is focused in developers, security researchers, exploit writers or reverse engineers looking to learn about the common techniques, tips and Tools for analyzing current complex malware.

- Good knowledge of English
- Beginner knowledge of x86 assembly
- Medium programming background (any language but C or C++ preferred)
- Basic knowledge of debugging and disassembly tools such as IDA and
- Basic knowledge of binary unpacking


- A set of tools will be provided (free version of IDA, ImmunityDbg, LordPE)
- A set of binary files for the hands-on part of the training will be provided

TRAINER: Joan Calvet
Joan Calvet is a Ph.D. student at the High Security Lab in LORIA (Nancy, France) and the SecSI Lab at the Ecole Polytechnique of Montreal. He also frequently collaborates with anti malware company ESET. His main interests lie in malware analysis, reverse engineering, and software security. Joan has presented at various international conferences including REcon and Virus Bulletin.


  1. This is quite a topnotch course for security personnel against malware. It is true that malware reverse engineering is used to identify the malware strains.
    anti spam service

    1. I have read your blog its very attractive and impressive. I like it your blog.

      JavaEE Training in Chennai JavaEE Training in Chennai

      Java Training in Chennai Core Java Training in Chennai Core Java Training in Chennai

      Java Online Training Java Online Training Core Java 8 Training in Chennai Java 8 Training in Chennai

  2. This is an awesome post.Really very informative and creative contents. These concept is a good way to enhance the knowledge.I like it and help me to development very well.Thank you for this brief explanation and very nice information.Well, got a good knowledge.
    Python Training in Chennai

  3. The only thing I've trained in my life is my writing skills. I must say that was helpful. You can do the same if you are interested in writing.

  4. Integrity will certainly give you the complete version of online account. Fidelity Net Benefits Login If you already have a Fidelity or Internet Benefits account.

  5. In an unexpected turn on this contamination technique, numerous malware applications are really showcased as against malware instruments, and these are not patio activities - these are proficient looking and profoundly misleading sites that seem to offer honest to goodness items.poe security camera system

  6. Why make this a favorable selection visit website among the listed things and why there Water Flosser Reviews are tons of various other devices out there.