Courses http://10.10.10.29 Fri, 19 May 2017 12:57:32 +0000 en-US hourly 1 https://wordpress.org/?v=4.6.1 APT Tactics and Defense http://10.10.10.29/resources/cybersecurity-training-course-apt-tactics-and-defense/ Thu, 01 Sep 2016 01:44:15 +0000 http://10.10.10.29/?post_type=resources&p=1519 Continue reading APT Tactics and Defense ]]> 3 Days

Course Overview

In this short course, we aim to present how malware relates to APTs and how they differ from that used in more common, untargeted attacks.

We detail the typical intentions of an attacker and the tools and processes they would leverage to attain these goals.

Lastly, the course presents key approaches to detect and terminate the process of an APT, and the infrastructure required for effective incident response.

Materials to bring

Laptop computer able to run 64-bits virtual machines.
VMware Workstation 11+, or VMware Fusion 6+,
or VMware Player 11+

Course prerequisites

None

Course Breakdown

Day 1

Targeted attacks: why and how
– Goals of the APT
– Software attacks
– Non-software attacks
– People-based attacks

Day 2

Tactics and footprint of targeted attacks
– Defense systems and their weaknesses
– Signs of attacks

Day 3

Effective defense against targeted attacks
– Pitfalls of attribution and deniability
– Reverse engineering
– Undermining exploitation
– CERT team cooperation and sharing

acp_pdf-2_file_document

]]>
Threat Detection and Simulated Engagement http://10.10.10.29/resources/threat-detection-and-simulated-engagement/ Mon, 01 Aug 2016 01:52:44 +0000 http://10.10.10.29/?post_type=resources&p=1527 Continue reading Threat Detection and Simulated Engagement ]]> 5 Days

Course Overview

Introduction of malware detection through its behaviours, storage and persistence tricks.

The first part of the course covers how to use Windows system introspection tools to find occurrences of running malware. While using Arc4dia’s SNOW technology, the second part involves hands-on detection of malware and attacks live across a lab infrastructure.

Materials to bring

Laptop computer able to run 64-bits virtual machines.
VMware Workstation 11+, or VMware Fusion 6+, or VMware Player 11+

Course prerequisites

Intro to Reverse Engineering

Course Breakdown

Day 1

Dynamic malware hunting
– Hunting with Sysinternals tools
– Thread injection
– Hiding modules
– Autoruns
– API hooking

Day 2

Malware appearance and behaviour
– False positives and false negatives
– Destructive malwares
– Rootkits

Day 3

Forensic analysis
– Volatility framework
– System dumping
– Process hiding
– Code injection
– Process dumping
– Footprints

Day 4

Hunting with SnowBoard 1
– Introduction to Snow
– Introduction to the SnowBoard interface
– Alert investigation
– Statistic investigation

Day 5

Hunting with SnowBoard 2
– Clustering rules
– Cloud modules
– Malware profiles

acp_pdf-2_file_document

]]>
Advanced Reverse Engineering http://10.10.10.29/resources/arc4dias-cybersecurity-training-courseadvanced-reverse-engineering/ Fri, 01 Jul 2016 01:35:31 +0000 http://10.10.10.29/?post_type=resources&p=1515 Continue reading Advanced Reverse Engineering ]]> 5 days

Course Overview

This course follows up on the introduction and completes the budding reverse engineering skills of students against modern, APT- related malware.

We start by discussing how malware conceals its behaviour to prevent reverse engineering including the following: encryption,
compression, mangling and self-unpacking shims.

We then present how malware hides itself to persist on a system, either as a user-mode program, or as a kernel-mode module.

Other covered subjects include communication features for communicating with other processes, command and control infrastructure, malware implemented using exotic runtime
technologies, and signature malware behaviour, such as keylogging and privilege elevation.

Materials to bring

Laptop computer able to run 64-bits virtual machines.
VMware Workstation 11+, or VMware Fusion 6+, or VMware Player 11+

Course prerequisites

Intro to Reverse Engineering

Course Breakdown

Day 1

APTs and their configurations
– Mangling
– Compression
– Encryption
– Self-unpacking

Day 2

Malware hiding techniques
– Code injection
– API hooking
– Hook injection
– APC injection
– Process hollowing
– SSDT hooking
– Filter drivers

Day 3

Malware communication
– Inter-process communication
– Configuration files
– File transfer
– C2 communication

Day 4

Strangely constructed malware
– C++
– COM
– Delphi

Day 5

Recognizing typical constructs
– Key logging
– Shell redirection
– Privilege escalation
– Driver/service installation

acp_pdf-2_file_document

]]>
Introduction to Reverse Engineering http://10.10.10.29/resources/introduction-to-reverse-engineering/ Wed, 01 Jun 2016 01:54:14 +0000 http://10.10.10.29/?post_type=resources&p=1534 Continue reading Introduction to Reverse Engineering ]]> 5 days

Course Overview

In this course we present the fundamental skills for understanding the malware actions and behaviour of Windows programs.

We start with an introduction to Intel assembly language – both 32 and 64 bit, and carry on with a detailed exposition of Windows executables and dynamic libraries. Reverse engineering of
actual malware examples are then presented in a tutorial fashion using professional disassembly and debugging software.

Through hands-on labs, the students learn how to defeat code obfuscation and techniques used by malware authors to hamper dynamic reverse engineering.

Materials to bring

Laptop computer able to run 64-bits virtual machines.
VMware Workstation 11+, or VMware Fusion 6+, or VMware Player 11+

Course prerequisites

Medium-level computer programming skills

Course Breakdown

Day 1

Static reverse engineering
– Introduction
– Binary analysis
– PE file format
– Introduction to x86 assembly
– Introduction to IDA

Day 2

Dynamic reverse engineering
– VM configuration
– Sysinternals tools for reverse engineering
– Introduction to the IDA debugger

Day 3

Common malware behaviours
– Types and families
– Persistence
– Data encoding

Day 4

Advanced dynamic reverse engineering
– Introduction to AMD64
– Code obfuscation
– Real malware reverse engineering

Day 5

Anti-reverse engineering techniques
– Basic techniques
– Bypass approaches

acp_pdf-2_file_document

]]>