Malware Analysis and Reverse Engineering

For Security Analyst, it is essential to know how to do a Malware Analysis and Reverse Engineering. One of the basic and amazing tools that are used with malware analysis are Sysinternals suite that is develop by Microsoft; here is a an amazing link that you can use to learn about Sysinternal and how they are used, https://www.microsoftvirtualacademy.com/training-courses/utilizing-sysinternals-tools-for-it-pros.

This is a quick post for starting Malware Analysis, and I`ll follow up later on with other tools and methods to kick off with malware analysis tools that are actually used by the Security Professionals around the world.

 

Regards,

Khalid

Ahmed Harris

Cyber Security Defense | Resilience | Threat Intelligence | Risk Assessment | Security Reviews | Assurance | Practice Management | Strategy | Architecture | Project Management | DFIR | PCI-DSS | ISO27001 | C2M2 |

9 年

System internal provides the basic tool-set for mostly dynamic analysis for malware reverse engineering for windows systems but it does not provide anything comprehensive for static analysis. Mostly utility such as "Process Monitor can monitor network, registry, file system, processes and thread and profiling events". System internal is mostly useful for system administrators and also post incident analysis for connecting the dots to an event. Here is a something to start off with https://www.howtogeek.com/school/sysinternals-pro/lesson4/all/

回复

要查看或添加评论,请登录

Khalid Alateeq的更多文章

  • Key Requirements for an Effective Network Detection and Response (NDR) Solution as per the NCA NDR guidelines

    Key Requirements for an Effective Network Detection and Response (NDR) Solution as per the NCA NDR guidelines

    Introduction In today’s digital world, organizations face an increasing number of sophisticated cyber threats. Network…

  • Email Gateway Administration

    Email Gateway Administration

    I have been seeing many Email Gateway administrators are suffering from what the information security teams are looking…

    1 条评论
  • Cyber Threat Intelligence: extracting the needle

    Cyber Threat Intelligence: extracting the needle

    A lot of security professionals doing their best on a daily-basis to defend their adversaries and to find evil in their…

    1 条评论
  • Cyber Threat Intelligence

    Cyber Threat Intelligence

    Everybody in the Cyber Security field sure enough heard something about what so called “Threat Intelligence”. Plus…

    5 条评论
  • Cyber Defense Centers " Capability & Maturity"

    Cyber Defense Centers " Capability & Maturity"

    Cyber Defense Center should be in-place to enable an organization to transition from a “reactive” incident response…

    5 条评论
  • SOC SIEM - Use-Cases

    SOC SIEM - Use-Cases

    Security Operations Centers have been the trending topic in the last few years, and the fact is that these center are…

    13 条评论