Threat Detection and Simulated Engagement

5 Days

Course Overview

Introduction of malware detection through its behaviours, storage and persistence tricks.

The first part of the course covers how to use Windows system introspection tools to find occurrences of running malware. While using Arc4dia’s SNOW technology, the second part involves hands-on detection of malware and attacks live across a lab infrastructure.

Materials to bring

Laptop computer able to run 64-bits virtual machines.
VMware Workstation 11+, or VMware Fusion 6+, or VMware Player 11+

Course prerequisites

Intro to Reverse Engineering

Course Breakdown

Day 1

Dynamic malware hunting
– Hunting with Sysinternals tools
– Thread injection
– Hiding modules
– Autoruns
– API hooking

Day 2

Malware appearance and behaviour
– False positives and false negatives
– Destructive malwares
– Rootkits

Day 3

Forensic analysis
– Volatility framework
– System dumping
– Process hiding
– Code injection
– Process dumping
– Footprints

Day 4

Hunting with SnowBoard 1
– Introduction to Snow
– Introduction to the SnowBoard interface
– Alert investigation
– Statistic investigation

Day 5

Hunting with SnowBoard 2
– Clustering rules
– Cloud modules
– Malware profiles

acp_pdf-2_file_document