What's new

Purchased [Udemy] Reverse Engineering Essentials (Cristina Gheorghisan)

Purchase Information
Type of purchase: Collaborative
Price: 160 USD
Participants: 0 of 10
Organizer: Zeus Zeus
Status: Gathering payment
Payment: 16.6 USD
Main list
Reserve list


Staff member
    • Setup 12:16
    • Предпросмотр08:50
    • Hardening - VM Detection 08:40
    • Hardening - VM Detection Practice 13:14
    • Hardening - Anti VM Detection Practice 12:44
    • Anti-VM and Anti-Debug 10:26
    • Anti-VM and Anti-Debug Practice 1
    • Anti-VM and Anti-Debug Practice 2
    • Anti-VM and Anti-Debug Practice 3
    • Anti-VM and Anti-Debug Practice 4

  • Monitor Process Activity
  • Monitor Process Activity Practice 1
  • Monitor Process Activity Practice 2
  • Monitor Process Activity Practice 3
  • Monitor Process Activity Practice 4
  • Spotting suspicious process 4 вопроса
  • Monitor API Calls
  • Monitor API Calls Practice 1
  • Monitor API Calls Practice 2
  • Monitor API Calls Practice 3
  • Monitor API Calls Assignment 3 вопроса
  • Monitor Registry and File System
  • Monitor Registry and File System Practice 1
  • Monitor Registry and File System Practice 2
  • Monitor Registry and File System Assignment 3 вопроса
  • Monitor Network Activity
  • Monitor Network Activity Practice 1
  • Monitor Network Activity Practice 2
  • Monitor Network Activity Practice 3
  • Monitor Network Activity Practice 4
  • Monitor Network Activity Practice Assignment 5 questions
  • Sandboxing Practice 1
  • Sandboxing Practice 2
  • Static Analysis
  • Static Analysis Practice 1
  • Static Analysis Practice 2
The aim of this course is to cover the essentials techniques and tools for reverse engineering and malware analysis. As the title suggests, we will cover only the Windows environment in this class, since it is by far the most used and abused. We try to provide a complete picture for the starting reverse engineer but in the same time relevant for the more advanced analysts.
There are always multiple ways to do a task. We will insist more on "Why?"s instead of "How?"s since we consider that it's more important to understand WHAT we're trying to achieve and WHY.
There are no pre-requisites for this class other that a Windows virtual machine and the will to learn. All the tools discussed here are freely available online. Analyses are demonstrated on a Windows 8.1 virtual machine.
Don't worry! Neither professional programming experience nor assembly language knowledge are required to benefit from the course. If you know these already, it would be helpful when we’ll look at identifying encryption algorithms and bypass anti-virtualisation checks. The concepts will be explained clearly and additional resources will be recommended.
Some programming experience will definitely be beneficial, however, the focus will be mostly on understanding the technique, the tools and their most useful features. When needed, source code written in C or Python will be provided.
To get the most out of this course, we recommended to try all the exercises and assignments that follow the lectures and whenever a concept or idea is not fully explained or clearly understood, either reach out with questions on the Q&A section or consult online resources.