Reverse Engineering

CR113


5 Days

Download Full Syllabus Request a Quote
All Our Courses Now Also LIVE

Course Outline

This course covers reverse engineering, and provides students with the knowledge & practical training needed to excel at one of the most desired skills in hacking. The course teaches students about malware activity, and how to bypass limitations, such as antidebugging and VM detection techniques.

Lessons in the course provide in-depth coverage of the many methods used in reverse engineering. Topics include Assembly language, CPU & RAM architecture, malware disassembly & debugging, program patching, anti-debugging, and VM detection. This course features hands-on simulations provided by @Cywar – a gamified training and assessment platform by HackerU Solutions.

Upcoming
Meetings

There are no upcoming meetings for this course.
Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.com

Modules

Hello Assembly
  • What is Assembly
  • CPU architecture
  • Registers types & structure
  • Commands in RAM & RAM’s structure
  • Stack & Heap
  • Comparisons - cmp, zf instructions
  • Basic C
  • Introduction to IDA
Malware Disassembly
  • IDA overview
  • Jumping between display
  • Code-flow analysis
  • Code segments
  • Variables identifications
  • Arithmetic identification
  • Conditions identification
Malware Debugging
  • Debugging process
  • Software & Breakpoint
  • ollyDBG overview
  • Following the stack
  • Stepping
Patching & Anti-debugging
  • Combined analysis
  • Runtime manipulation
  • Changing code-flow
  • Patching
Patching & Anti-debugging
  • Anti-debugging
  • PEB
  • VM detection
  • Anti-debugging & VM detection Bypass

Prerequisites

  • Working knowledge of Windows OS, Linux OS, and information security
  • Programing background in C, Python, or Java

Upcoming Meetings

There are no upcoming meetings for this course.
Contact us to schedule this course customized for your organization in a group format.
info@hackerupro.com
Bypass underlying VM detection mechanisms”
Download Full Syllabus

Target Audience

Contact Us

    • Israel
    • Poland
    • USA
    • India
    Skip to content