Malware Analysis and Reverse Engineering
Khalid Alateeq
Executive Advisor | Business Growth | Cyber Security Leadership & Management | Program Management | Board Advisor
For Security Analyst, it is essential to know how to do a Malware Analysis and Reverse Engineering. One of the basic and amazing tools that are used with malware analysis are Sysinternals suite that is develop by Microsoft; here is a an amazing link that you can use to learn about Sysinternal and how they are used, https://www.microsoftvirtualacademy.com/training-courses/utilizing-sysinternals-tools-for-it-pros.
This is a quick post for starting Malware Analysis, and I`ll follow up later on with other tools and methods to kick off with malware analysis tools that are actually used by the Security Professionals around the world.
Regards,
Khalid
Cyber Security Defense | Resilience | Threat Intelligence | Risk Assessment | Security Reviews | Assurance | Practice Management | Strategy | Architecture | Project Management | DFIR | PCI-DSS | ISO27001 | C2M2 |
9 年System internal provides the basic tool-set for mostly dynamic analysis for malware reverse engineering for windows systems but it does not provide anything comprehensive for static analysis. Mostly utility such as "Process Monitor can monitor network, registry, file system, processes and thread and profiling events". System internal is mostly useful for system administrators and also post incident analysis for connecting the dots to an event. Here is a something to start off with https://www.howtogeek.com/school/sysinternals-pro/lesson4/all/