Requirements
- Basic programming knowledge
- A computer that can run a Windows virtual machine.
- An interest in disassembling things and understanding how they work!
- Patience and perseverance to “try harder”.
Description
The aim of this course is to provide a practical approach to analysing ransomware. Working with real world samples of increasing difficulty, we will:Deep dive into identifying the encryption techniques,Navigate through various evasion tricks used by malware writers,Have fun discovering flaws in their logic or the implementation and finallyWorking out automated ways to recover the affected files.
Who this course is for:
- Security testers
- Malware analysts
- Forensics investigators
- System administrators
- Information security students
- Anyone interested in ransomware and malware analysis