How to Protect Yourself and Your Company Against Sneaky Malware by Designing a Tricky Ransomware! In this workshop, you will practically learn how to analyze modern malware by performing static and dynamic analysis techniques in a sandboxing environment.
Furthermore, you will learn how to identify sneaky malware by creating new malware (e.g., Ransomware) for educational purposes. This practice will illustrate to you how to digest malware internals and read the attacker's mind and predict potential techniques in other malware. Moreover, I will discuss and practice several critical techniques that sophisticated malware writers nowadays use to circumvent standard protection systems (e.g., AV engines and Firewalls). At the end of the day, you will be able to analyze advanced malware and protect yourself and your company against different kinds of deceptive and tricky malware such as ransomware, backdoors, and trojans.
What you'll learn:
• -The differences between various categories of malware in real-world hacking such as ransomware, trojan, and keylogger in ethical hacking
• -Java basics in order to design a case study malware
• -Common cryptographic algorithms (by visual examples) used in ransomware
• -Malware internals and how a malware designer thinks!
• -Sophisticated malware bypass security mechanisms such as antivirus engines
• -How to set up a practical sandbox environment for malware analysis
• -How to perform malware analysis by static code analysis
• -How to analyze potential malicious executable paths via call-graph extraction
• -How to perform dynamic taint tracking to catch dynamic code generation and malicious libraries installed by program updates
• -How to write a technical report and publish your results effectively