Malware Analysis: Assembly Basics

Malware Analysis: Assembly Basics

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 1h 28m | 183 MB

Learning tools such as IDA Pro and Ghidra starts with understanding assembly. This course will teach you the basics of the assembly language to get started as a reverse engineer!

Reverse engineering unlocks the hidden world of malware, revealing its true intentions and providing irrefutable evidence. In this course, Malware Analysis: Assembly Basics, you’ll be equipped with the foundational knowledge of assembly language, the key to wielding powerful tools like IDA Pro and Ghidra. First, you’ll demystify machine code and understand why reverse engineering is essential for malware analysis. You’ll become familiar with low-level instructions and how the CPU operates. Next, you’ll learn how to recognize common data and control structures in assembly, allowing you to identify key program functionality. Finally, you’ll solidify your understanding by building simple assembly programs yourself. When you’re finished with this course you’ll have the skills and knowledge necessary to begin your journey to become a reverse engineer.

Table of Contents

Course Overview
1 Course Overview

Demystifying CPU Architecture and Number Systems
2 Course Introduction
3 Diving into CPU Internals
4 Grouping Assembly Instructions
5 There Is More Than Just Base 10

Learning the Building Blocks of Assembly
6 Constructing and Deconstructing Code
7 Functions and the Stack
8 Calling Conventions
9 Pointers and Memory
10 Demo – Analyzing Disassembled Code

Common Code Structures
11 Understanding Comparisons and Jumps
12 Conditions and IF Statements
13 Identifying Loops and Switches
14 Demo – Following Branching Logic
15 Understanding Arrays and Structures
16 Demo – Tracing a More Complex Program

Homepage