Focus on Virus
Malware analysis. Jul 12 2013 10:25AM
Jason Long (hack3rcon yahoo com) (4 replies)
Re: Malware analysis. Jul 12 2013 12:37PM
Mustafa Qasim (alajal gmail com) (1 replies)
Jason,

In my opinion one need to know Assembly and Reversing well to be a
Malware Analyst/Reverse Engineer . For beginners it's good a follow
the following path in order

**Security Tube

Assembly Megaprimer (Windows & Linux)
http://www.securitytube.net/groups?operation=view&groupId=5
http://www.securitytube.net/groups?operation=view&groupId=6

**OpenSecurityTraining

Intro to x86
http://opensecuritytraining.info/IntroX86.html

Malware Dynamic Analysis
http://opensecuritytraining.info/MalwareDynamicAnalysis.html

Introduction to Reverse Engineering Software
http://opensecuritytraining.info/IntroductionToReverseEngineering.html

Reverse Engineering Malware
http://opensecuritytraining.info/ReverseEngineeringMalware.html

Rootkits
http://opensecuritytraining.info/Rootkits.html

Practical Malware Analysis (http://amzn.com/1593272901) is an awesome book.

Thanks

------------------------------------------------------------------------
---
This list is sponsored by: Black Hat

Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier
technical event for ICT security experts. Featuring 30 hands-on training
courses and 90 Briefings presentations with lots of new content and new
tools. Network with 4,000 delegates from 70 nations. Visit product
displays by 30 top sponsors in a relaxed setting.

http://www.blackhat.com
------------------------------------------------------------------------
---

[ reply ]
Re: Malware analysis. Jul 12 2013 08:12PM
Willis Lockett (willis lockett gmail com)
Re: Malware analysis. Jul 12 2013 11:45AM
Roland Kessler (rokessler gmx net) (1 replies)
RE: Malware analysis. Jul 12 2013 12:35PM
Ziots, Edward (EZiots Lifespan org)
Re: Malware analysis. Jul 12 2013 11:28AM
manish rawat (manish21rawat gmail com)
Re: Malware analysis. Jul 12 2013 11:10AM
Mrs. Y (networksecurityprincess gmail com)


 

Privacy Statement
Copyright 2010, SecurityFocus