Malware Analysis

  1. Setting Up the Analysis Laboratory
    1. The Concept of a Safe Environment
      1. Risks of Malware Analysis
        1. Isolation Principles
          1. Containment Strategies
          2. Virtualization for Isolation
            1. Host-Only Networking
              1. Preventing External Communication
                1. Internal Network Simulation
                2. Virtual Machine Snapshots
                  1. Rollback and Recovery
                    1. State Management
                    2. Types of Hypervisors
                      1. Type 1 (Bare-metal)
                        1. VMware ESXi
                          1. Microsoft Hyper-V
                            1. Citrix XenServer
                              1. Features and Use Cases
                              2. Type 2 (Hosted)
                                1. VMware Workstation
                                  1. Oracle VirtualBox
                                    1. Parallels Desktop
                                      1. Features and Use Cases
                                  2. Essential Software and Tools
                                    1. Virtualization Software
                                      1. VMware Products
                                        1. VirtualBox
                                          1. Hyper-V
                                            1. QEMU
                                            2. Analysis Operating Systems
                                              1. Windows Analysis Environments
                                                1. Windows 7
                                                  1. Windows 10
                                                    1. Windows Server Editions
                                                    2. Linux Analysis Environments
                                                      1. Ubuntu
                                                        1. Kali Linux
                                                          1. CentOS
                                                          2. Pre-built Analysis Distributions
                                                            1. REMnux
                                                              1. FLARE VM
                                                                1. SIFT Workstation
                                                              2. Network Analysis Tools
                                                                1. Packet Capture Tools
                                                                  1. Wireshark
                                                                    1. tcpdump
                                                                      1. NetworkMiner
                                                                      2. Network Simulators
                                                                        1. FakeNet-NG
                                                                          1. INetSim
                                                                            1. Honeyd
                                                                          2. Debuggers and Disassemblers
                                                                            1. User-Mode Debuggers
                                                                              1. x64dbg
                                                                                1. OllyDbg
                                                                                  1. Immunity Debugger
                                                                                  2. Kernel-Mode Debuggers
                                                                                    1. WinDbg
                                                                                      1. SoftICE
                                                                                      2. Disassembler Suites
                                                                                        1. IDA Pro
                                                                                          1. Ghidra
                                                                                            1. Radare2
                                                                                              1. Binary Ninja
                                                                                            2. Custom Analysis Scripts
                                                                                              1. Automation of Repetitive Tasks
                                                                                                1. Scripting Languages
                                                                                                  1. Python
                                                                                                    1. PowerShell
                                                                                                      1. Bash
                                                                                                  2. Physical vs. Virtual Labs
                                                                                                    1. Pros and Cons
                                                                                                      1. Flexibility
                                                                                                        1. Cost
                                                                                                          1. Security
                                                                                                            1. Performance
                                                                                                            2. Air-gapped Networks
                                                                                                              1. Implementation
                                                                                                                1. Use Cases
                                                                                                                  1. Security Benefits