1 |
Automated Tools |
Static and dynamic binary analysis using free online fully-automated tools |
1/25/2022 |
2/1/2022 at 11:59pm |
2 |
Analysis Lab: Static Analysis Tools |
Static analysis tools to examine an unknown binary "at rest" |
2/1/2022 |
2/8/2022 at 11:59pm |
3 |
Analysis Lab: Behavioral Analysis Tools |
Behavioral analysis tools to monitor an unknown binary during execution |
2/8/2022 |
2/15/2022 at 11:59pm |
4 |
Win32 API |
Create 'fake-malware' to learn about common Windows API functions |
2/15/2022 |
3/1/2022 at 11:59pm |
5 |
x86 Assembly Code |
Explore compiler-generated x86 assembly from C source code |
3/1/2022 |
3/8/2022 at 11:59pm |
6 |
Disassemblers and Debuggers |
Use a disassembler and debugger to analyze a piece of malware from the inside while it is running |
3/10/2022 |
3/24/2022 at 11:59pm |
7 |
Disassemblers (IDA) |
Use the IDA disassembler to analyze a piece of malware at rest |
3/24/2022 |
3/31/2022 at 11:59pm |
8 |
Anti-RE Techniques |
Explore how malware authors protect their binaries from reverse engineering |
4/5/2022 |
4/14/2022 at 11:59pm |
9 |
Anti-RE Techniques 2 |
Explore how malware authors protect their binaries from reverse engineering |
4/19/2022 |
4/26/2022 at 11:59pm |
10 |
Document Malware |
Examine malicious PDF and Office documents used as droppers and downloaders |
4/26/2022 |
5/3/2022 at 11:59pm |