Reverse Engineering & Malware Analysis of .NET & Java

seeders: 18
leechers: 9
updated:
Added by tutsnode in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 59
  • Language: English

Files

Reverse Engineering & Malware Analysis of .NET & Java [TutsNode.com] - Reverse Engineering & Malware Analysis of .NET & Java 01 Introduction
  • 003 Configuring the Virtual Machine.mp4 (152.4 MB)
  • 002 Lab Setup-v3.pdf (56.7 KB)
  • 003 Configuring the Virtual Machine.en.srt (12.7 KB)
  • 002 windows 7 download links - v3.txt (0.4 KB)
  • 004 flarevm.txt (0.1 KB)
  • 002 Install a Virtual Machine.en.srt (9.1 KB)
  • 004 Installing Tools_ FlareVM.en.srt (3.9 KB)
  • 001 Introduction.en.srt (3.3 KB)
  • 002 Install a Virtual Machine.mp4 (77.6 MB)
  • 004 Installing Tools_ FlareVM.mp4 (59.6 MB)
  • 001 Introduction.mp4 (40.8 MB)
08 Lab Exercise_ Analyzing a .NET Malware (SamSam Ransomware)
  • 013 PS_DotNet_RealWorld_Ransomware.zip (16.7 KB)
  • 002 Lab_ Reverse Engineering .NET Ransomware - Part 1.en.srt (12.4 KB)
  • 003 Lab_ Reverse Engineering .NET Ransomware - Part 2.en.srt (6.7 KB)
  • 001 Lab Exercise_ Principles of Analyzing a .NET Ransomware.en.srt (6.2 KB)
  • 013 password.txt (0.1 KB)
  • 002 Lab_ Reverse Engineering .NET Ransomware - Part 1.mp4 (102.3 MB)
  • 003 Lab_ Reverse Engineering .NET Ransomware - Part 2.mp4 (70.8 MB)
  • 001 Lab Exercise_ Principles of Analyzing a .NET Ransomware.mp4 (23.7 MB)
  • 013 Principles of Analyzing dotNet Ransomware.pdf (539.4 KB)
07 Lab Demo on Reverse Engineering .NET executables
  • 002 Lab Demo Walkthrough_ Reverse Engineering .NET.en.srt (13.3 KB)
  • 002 Lab Demo Walkthrough_ Reverse Engineering .NET.mp4 (102.7 MB)
  • 001 Lab Demo Instructions on Reverse Engineering .NET executables.en.srt (2.1 KB)
  • 011 PS_DotNet_Lab1.zip (5.8 KB)
  • 011 password.txt (0.1 KB)
  • 011 Lab Demo - reversing dotnet binary.pdf (465.3 KB)
  • 001 Lab Demo Instructions on Reverse Engineering .NET executables.mp4 (8.0 MB)
06 Using dnSpy
  • 001 Using dnSpy for the first time.en.srt (13.1 KB)
  • 010 dotnet_demo1.zip (2.1 KB)
  • 010 password.txt (0.1 KB)
  • 001 Using dnSpy for the first time.mp4 (90.4 MB)
11 Reverse Engineering and Malware Analysis of Java Binary Using ByteCode Viewer
  • 003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.en.srt (11.2 KB)
  • 002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.en.srt (10.0 KB)
  • 021 PS_Java_Demo1_Jar.zip (3.5 KB)
  • 001 Reverse Engineering Java Binary Using ByteCode Viewer.en.srt (2.8 KB)
  • 022 password.txt (0.1 KB)
  • 021 password.txt (0.1 KB)
  • 002 Lab Practical Demo_ Reverse Engineering and Malware Analysis of Java Binary.mp4 (97.6 MB)
  • 022 PS_Java_Lab_01_Jar.zip (203.4 KB)
  • 003 Lab Practical Demo 2_ Reverse Engineering and Malware Analysis of Java Binary.mp4 (94.5 MB)
  • 001 Reverse Engineering Java Binary Using ByteCode Viewer.mp4 (18.0 MB)
10 Principles of Java Bytecodes
  • 002 Analyzing Java ByteCodes by Disassembling.en.srt (4.4 KB)
  • 001 Principles of Java Bytecodes.en.srt (7.2 KB)
  • 018 password.txt (0.1 KB)
  • 018 hello-earth-proj.zip (0.5 KB)
  • 001 Principles of Java Bytecodes.mp4 (28.6 MB)
  • 002 Analyzing Java ByteCodes by Disassembling.mp4 (24.4 MB)
  • 018 principles of java bytecode.pdf (753.6 KB)
05 Installing dnSpy
  • 009 dnSpy link.txt (0.2 KB)
  • 001 Installing dnSpy.en.srt (4.8 KB)
  • 001 Installing dnSpy.mp4 (32.1 MB)
03 Installing ILDASM and ILASM
  • 006 download link for visual studio.txt (0.1 KB)
  • 001 Installing ILDASM and ILASM.en.srt (5.0 KB)
  • 001 Installing ILDASM and ILASM.mp4 (39.2 MB)
12 Lab Exercise_ Analyzing a Java RAT (Crossrat Trojan)
  • 023 Java_RealWorld-CrossRAT.zip (211.3 KB)
  • 002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).en.srt (8.7 KB)
  • 001 Principles of Analyzing a Java RAT.en.srt (2.0 KB)
  • 023 password.txt (0.1 KB)
  • 002 Lab Exercise Walkthrough_ Analyzing a Java RAT (Crossrat Trojan).mp4 (58.8 MB)
  • 023 Principles of Analyzing Java RAT.pdf (430.8 KB)
  • 001 Principles of Analyzing a Java RAT.mp4 (7.1 MB)
04 Principles of .NET Analysis
  • 001 Principles of .NET Analysis.en.srt (8.5 KB)
  • 002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.en.srt (7.9 KB)
  • 007 List of CIL Instructions.txt (0.1 KB)
  • 008 dotnet_demo1.zip (2.1 KB)
  • 008 password.txt (0.1 KB)
  • 002 Lab Demo_ Disassembling with ildasm and Patching with ilasm.mp4 (49.2 MB)
  • 001 Principles of .NET Analysis.mp4 (35.2 MB)
  • 007 Principles of .NET Analysis-v2.pdf (510.9 KB)
09 Lab Exercise_ Analyzing a .NET Spyware Trojan (Infostealer)
  • 001 Dynamic Analysis of .NET Trojan - Part 1.en.srt (7.6 KB)
  • 002 Dynamic Analysis of .NET Trojan - Part 2.en.srt (6.6 KB)
  • 016 password.txt (0.1 KB)
  • 002 Dynamic Analysis of .NET Trojan - Part 2.mp4 (74.8 MB)
  • 001 Dynamic Analysis of .NET Trojan - Part 1.mp4 (50.6 MB)
  • 016 lab1-dotnet-trojan.zip (455.6 KB)
02 Principles of .NET and Java Malware Analysis
  • 001 Principles of .NET and Java Malware Analysis.en.srt (7.2 KB)
  • 001 Principles of .NET and Java Malware Analysis.mp4 (31.8 MB)
  • 005 principles of dotnet and java malware analysis.pdf (728.3 KB)
13 Resources For Further Study
  • 001 Where to Download Malware Samples to Practice Malware Analysis.en.srt (1.2 KB)
  • 002 Bonus Lecture.en.srt (1.6 KB)
  • 025 malware samples urls.txt (0.6 KB)
  • 001 Where to Download Malware Samples to Practice Malware Analysis.mp4 (12.3 MB)
  • 002 Bonus Lecture.mp4 (10.6 MB)
  • 026 useful-resources-for-further-study-2021.pdf (668.7 KB)
  • TutsNode.com.txt (0.1 KB)
  • [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)
  • .pad
    • 0 (0.0 KB)
    • 1 (0.0 KB)
    • 2 (186.6 KB)
    • 3 (173.4 KB)
    • 4 (7.0 KB)

Description


Description

New malware are being created everyday and poses one of the greatest threat to computer systems everywhere. In order to infect Windows, Linux and Mac OSX, malware authors create cross-platform malware using .NET and Java. This course will introduce you to the basics of how to analyze .NET and Java malware – one of the most common and popular ways to create cross platform malware. If you are a beginner just starting out on malware analysis and wish to gain a fundamental knowledge to analyze .NET or Java malware, then this course is for you. It is a beginner course which introduces you to the technique and tools used to reverse engineer and also analyze .NET and Java binaries.

In this course, you will learn how to check and analyze malicious .NET and Java executables for signs of malicious artifacts and indicators of compromise. This is a beginners course and targeted to those who are absolutely new to this field. I will take you from zero to proficient level in analyzing malicious .NET and Java binaries. You will learn using plenty of practical walk-throughs. We will learn the basic knowledge and skills in reverse engineering and analyzing malware. All the needed tools and where to download them will be provided. By the end of this course, you will have the fundamentals of malware analysis of .NET and Java under your belt to further your studies in this field. Even if you do not intend to take up malware analysis as a career, still the knowledge and skills gained would enable you to check executables for dangers and protect yourself from these attacks.

We will use Flare-VM and windows virtual machine. Flare-VM is a popular Windows based Malware Analyst distribution that contains all the necessary tools for malware analysis. All the essential theory will be covered but kept to the minimum. The emphasis is on practicals and lab exercises.

Go ahead and enroll now and I will see you inside.
Who this course is for:

Anyone who has no background in malware analysis and just starting out in this field
Hobbyist who just like to learn how to analyze .NET and Java malware
Students who like to get started on the career path to become malware analysts
Anyone eager to learn how to detect new malware

Requirements

Windows PC
Interest in Malware Analysis
Knowledge of C# and Java would be helpful

Last Updated 6/2021



Download torrent
1.4 GB
seeders:18
leechers:9
Reverse Engineering & Malware Analysis of .NET & Java


Trackers

tracker name
udp://inferno.demonoid.pw:3391/announce
udp://tracker.openbittorrent.com:80/announce
udp://tracker.opentrackr.org:1337/announce
udp://torrent.gresille.org:80/announce
udp://glotorrents.pw:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.pirateparty.gr:6969/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://9.rarbg.to:2710/announce
udp://shadowshq.yi.org:6969/announce
udp://tracker.zer0day.to:1337/announce
µTorrent compatible trackers list

Download torrent
1.4 GB
seeders:18
leechers:9
Reverse Engineering & Malware Analysis of .NET & Java


Torrent hash: 21903AE8836507A8A3C816AA7972A2E7A3BA23BB