New malware are being created everyday and poses one of the greatest threat to computer systems everywhere. In order to infect Windows, Linux and Mac OSX, malware authors create cross-platform malware using .NET and Java. This course will introduce you to the basics of how to analyze .NET and Java malware - one of the most common and popular ways to create cross platform malware. If you are a beginner just starting out on malware analysis and wish to gain a fundamental knowledge to analyze .NET or Java malware, then this course is for you. It is a beginner course which introduces you to the technique and tools used to reverse engineer and also analyze .NET and Java binaries.
New malware are being created everyday and poses one of the greatest threat to computer systems everywhere. In order to infect Windows, Linux and Mac OSX, malware authors create cross-platform malware using .NET and Java. This course will introduce you to the basics of how to analyze .NET and Java malware - one of the most common and popular ways to create cross platform malware. If you are a beginner just starting out on malware analysis and wish to gain a fundamental knowledge to analyze .NET or Java malware, then this course is for you. It is a beginner course which introduces you to the technique and tools used to reverse engineer and also analyze .NET and Java binaries.
In this course, you will learn how to check and analyze malicious .NET and Java executables for signs of malicious artifacts and indicators of compromise. This is a beginners course and targeted to those who are absolutely new to this field. I will take you from zero to proficient level in analyzing malicious .NET and Java binaries. You will learn using plenty of practical walk-throughs. We will learn the basic knowledge and skills in reverse engineering and analyzing malware. All the needed tools and where to download them will be provided. By the end of this course, you will have the fundamentals of malware analysis of .NET and Java under your belt to further your studies in this field. Even if you do not intend to take up malware analysis as a career, still the knowledge and skills gained would enable you to check executables for dangers and protect yourself from these attacks.
We will use Flare-VM and windows virtual machine. Flare-VM is a popular Windows based Malware Analyst distribution that contains all the necessary tools for malware analysis. All the essential theory will be covered but kept to the minimum. The emphasis is on practicals and lab exercises.
Go ahead and enroll now and I will see you inside.
Introduction and welcome to the course.
Install a Virtual Machine
Configuring the Virtual Machine
Installing Tools: FlareVM
Principles of .NET and Java Malware Analysis
Installing ILDASM and ILASM
Principles of .NET Analysis
Lab Demo: Disassembling with ildasm and Patching with ilasm
Installing dnSpy
Using dnSpy for the first time
Lab Demo Instructions on Reverse Engineering .NET executables
Lab Demo Walkthrough: Reverse Engineering .NET
Lab Exercise: Principles of Analyzing a .NET Ransomware
Lab: Reverse Engineering .NET Ransomware - Part 1
Dynamic Analysis of .NET Trojan - Part 1
Dynamic Analysis of .NET Trojan - Part 2
Static Analysis of Trojan Spyware - Part 1
Static Analysis of Trojan Spyware - Part 2
Principles of Java Bytecodes
Analyzing Java ByteCodes by Disassembling
Reverse Engineering Java Binary Using ByteCode Viewer
Lab Practical Demo: Reverse Engineering and Malware Analysis of Java Binary
Lab Practical Demo 2: Reverse Engineering and Malware Analysis of Java Binary
Principles of Analyzing a Java RAT
Lab Exercise Walkthrough: Analyzing a Java RAT (Crossrat Trojan)
Where to Download Malware Samples to Practice Malware Analysis
Bonus Lecture
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.