Assembly for Reverse Engineers was designed for those entering the field of Malware Analysis. The course will teach you the common assembly statements and operands as well as how to write and reverse assembly. Day five of the class is the Student Practical Demonstration. Using the tools, skills, and methodologies taught in Days one through four of the class, students will derive answers in a Stack Tracing Assignment. Upon completion, each student will reverse engineer a binary application to uncover its capabilities and document its procedures and code paths.
Before taking this course, previous knowledge of C programming as well as a solid understanding of operating systems is recommended. Introduction to C Programming and Operating Systems Fundamentals are good preparatory classes.
5 Days/Lecture & Lab
This course is designed for:
- Forensic Investigators who need to identify and examine malicious code on systems
- Exploitation Analysts needing reverse engineering skills
- Penetration Testers who want to develop their own tools
- Malware Analysts requiring a thorough understanding malicious code
- What is Assembly?
- Computer Architecture Review
- X86 Memory Layout
- Essential Assembly Instructions
- X86 Memory Addressing Modes
- Strings and Arrays
- Control Structures
- How Compilers Work
- Modern Compilers
- PE File Structure
- Dynamic Memory Allocation
- Floating Point Arithmetic
- Identifying Developer Code
- Malware Specific Assembly Analysis
- Student Practical Demonstration