Reverse Engineering Malware Part II
Reverse engineering is one of the most well-paid skills in Cybersecurity, if you want to know how to do it then this is the right course for you. This is Parte II.
Introduction
Terms and Definitions
Platform Safety
Virtualization Considerations
Automated Malware Analysis Part I
Automated Malware Analysis Part II
Command Line Tools for Malware Analysis
Static Analysis
Analyzing Malware on REMNux
Packers
Radare2, Capa and Cutter
DIE Detect it Easy
XORsearch
Malware Detection
Dynamic Analysis
Reverse Engineering Recap and Basics
Reverse Engineering REMCOS RAT Part I
Reverse Engineering REMCOS RAT Part II
Reverse Engineering REMCOS RAT Part III
Reverse Engineering REMCOS RAT Part IV
Master OTW walks you through the techniques to find evidence of criminal activity on a computer or network. After completing these videos, you will be prepared to pass the CDFA exam at www.white-hat-hacker.com and become certified!
$99
In this Bug Bounty Hunting course, Master OTW will teach you how to seek and exploit application vulnerabilities using the necessary tools and techniques.
$199
This 3-year training program is specifically designed to prepare you to protect the corporate network. This is one of the fastest-growing and highest-paid positions in cybersecurity.
$2,000
Master OTW walks you through the techniques he and his team used to hack cameras in Ukraine and Russia at the request of the Ukraine Army.
$399