Free download » Free download video courses » IDA Pro 3 Hours Primer
| view 👀:168 | 🙍 oneddl | redaktor: FreshWap.CC | Rating👍:

IDA Pro 3 Hours Primer


IDA Pro 3 Hours Primer

Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: aac, 44100 Hz
Language: English | VTT | Size: 2.42 GB | Duration: 8 section | 19 lectures | (3h 4m)


What you'll learn
Manually unpack UPX, visualise unpacking routine, reconstruct and verify import tables
Analyse self-modifying code, patch and re-assemble routines
Analyse a user-mode rootkit that hides processes and Windows services
Analyse layers of obfuscations of Torlocker ransomware
Solve crackmes
Analyse 64-bit code: compiler optimisations, calling conventions, passing parameters and floating point numbers representation.
Requirements
There are no pre-requisites for this class other that a Windows virtual machine and the will to learn.
All the tools used here are freely available online.
Malware samples and scripts/programs presented are attached as resource.
Description
This course is logically designed to guide you through some of the complicated parts of static and dynamic analysis of malware, with IDA Pro. Instead of just introducing IDA features in a simple narrative way, we will work through interesting real world examples and samples. This way, each feature, tip or trick discussed will be put into context for easier learning. We will mainly cover IDA Pro for Windows and occasionally Linux, and introduce additional tools as well, like decompiler plugins, scripts and packers.
The course is very practical, focused on examples that can be done straight away. There are no pre-requisites for this class other that a Windows virtual machine and the will to learn. All the tools discussed are freely available online.
Neither professional programming experience nor assembly language knowledge are required to benefit from the course, although basic knowledge of both would be very helpful. The concepts will be explained clearly and concisely and additional resources are always available.
To get the most out of this course, we recommended doing all the exercises. You can post any queries or questions in the course Q&A section, and I will be more than happy to help.
Who this course is for:
Security testers
Malware analysts
Forensics investigators
System administrators
Information security students
Anyone interested in information security in general and reverse engineering in particular

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me





rapidgator
https://rapidgator.net/file/afc4461db4e5d2bd3f12f0c7cc1bb4af/xirlc.IDA.Pro.3.Hours.Primer.part1.rar.html
https://rapidgator.net/file/277735cb497462a7f8bf5fc2a04a904b/xirlc.IDA.Pro.3.Hours.Primer.part2.rar.html
https://rapidgator.net/file/3403e5de5b1bbd890a3ac3ceace6cbe5/xirlc.IDA.Pro.3.Hours.Primer.part3.rar.html




⚠️ Dead Link ?
You may submit a re-upload request using the search feature. All requests are reviewed in accordance with our Content Policy.

Request Re-upload
📌🔥Contract Support Link FileHost🔥📌
✅💰Contract Email: [email protected]

Help Us Grow – Share, Support

We need your support to keep providing high-quality content and services. Here’s how you can help:

  1. Share Our Website on Social Media! 📱
    Spread the word by sharing our website on your social media profiles. The more people who know about us, the better we can serve you with even more premium content!
  2. Get a Premium Filehost Account from Website! 🚀
    Tired of slow download speeds and waiting times? Upgrade to a Premium Filehost Account for faster downloads and priority access. Your purchase helps us maintain the site and continue providing excellent service.

Thank you for your continued support! Together, we can grow and improve the site for everyone. 🌐

Comments (0)

Information
Users of Guests are not allowed to comment this publication.