Remove malware-analysis-cheat-sheet
article thumbnail

REMnux Tools List for Malware Analysis

Lenny Zeltser

To guide you through the process of examining malware, REMnux documentation lists the installed tools by category. In addition to providing numerous tools as part of the REMnux distro, the project also offers several malware analysis tools as Docker images.

Malware 145
article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. As someone who’s helped thousands of security professionals learn how to analyze malware at SANS Institute , I have a few tips for how you can get started.

Malware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Get and Set Up a Free Windows VM for Malware Analysis

Lenny Zeltser

You’ll want snapshots when examining malware, so you can revert the VM’s state to start a new investigation or backtrack an analysis step. Step 3: Update the VM and Install Malware Analysis Tools. You can use this connection to update the OS to the latest patch level and install malware analysis tools.

Malware 112
article thumbnail

NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

You can download the GHIDRA source code and its component from the following links: Github — source code Download GHIDRA 9.0 — software package, slides, and exercises Installation Guide — basic usage documentation Cheat Sheet — keyboard shortcuts Issue Tracker — report bugs.

article thumbnail

Tips for Reverse-Engineering Malicious Code

Lenny Zeltser

This cheat sheet outlines tips for reversing malicious Windows executables via static and dynamic code analysis with the help of a debugger and a disassembler. Overview of the Code Analysis Process. Perform automated and manual behavioral analysis to gather additional details. Additional Code Analysis Tips.

article thumbnail

Learning Machine Learning Part 1: Introduction and Revoke-Obfuscation

Security Boulevard

Microsoft has a great cheat sheet that highlights common approaches:??. Principal Component Analysis. Principal component analysis (PCA) is commonly used for dimensionality reduction , which involves projecting a data set to a lower-dimensional space while attempting to explain most of the variance of the original data.