Overview
Many malware authors take deliberate steps to thwart the reverse engineering of their tools. Students will learn to combat sophisticated malware head-on by studying its anti-analysis techniques. This course focuses on advanced topic areas related to combating malware defense mechanisms, and as such, a practiced and robust malware analysis skill set is required. Before learning specific malware anti-analysis techniques, students will arm themselves with critical skills by learning to script IDA Pro and various debuggers to overcome challenging or repetitive tasks. Students will learn detailed information about defeating packed and armored executables and be challenged to defeat several difficult specimens throughout the course. Malware stealth techniques such as process injection and rootkit technology will be introduced, and tools and methodologies will be presented to aid analysis of such techniques. Hands on exercises, labs, and instruction cover the following topic areas:
What You Will Get:
Who Should Attend the Class:
Information security staff, forensic investigators or others requiring an understanding of how to overcome difficult challenges in malware analysis.
Prerequisites:
Training or experience in malware analysis and excellent knowledge of computer and operating system fundamentals is required. Some exposure to software development is highly recommended. Attendance in MANDIANT Malware II – Intermediate Malware Analysis, while not required, is extremely beneficial.
Nick Harbour is a Principal Consultant with Mandiant. He specializes in Malware Analysis and Incident Response as well as both offensive and defensive research and development. He also teaches malware analysis and reverse engineering. Nick's ten year history in the security industry began as a researcher and forensic examiner at the DoD Computer Forensics Lab (DCFL) where he helped pioneer the field of computer forensics. Nick is a developer of both free software including most notably dcfldd, the popular forensic disk imaging tool, tcpxtract, a tool for carving files out of network traffic and Mandiant Red Curtain and FindEvil, tools for identifying malicious binaries. He is also an expert in anti-reverse engineering technologies and has developed binary hardening tools such as PE-Scrambler. Nick is also a trained chef!
Jerrold “Jay” Smith is a Principal Consultant at Mandiant. Mr. Smith focuses on Mandiant's Federal Services work, providing specialized computer forensics and information security solutions for the company's federal client base. Mr. Smith has over five years experience in technical development experience in support of government computer network operations (CNO).
Mr. Smith came to Mandiant from the National Security Agency (NSA) where he most recently served as technical lead for a multi-million dollar strategic CNO development effort. In addition to his daily research and development duties Mr. Smith led a development team of government civilians, military personnel, and contractors. He worked with management to set time tables for product deliverables and oversaw the project through its entire life-cycle, from design, development, and testing through to its successful deployment.
Mr. Smith is a graduate of the NSA's three-year Systems and Network Interdisciplinary program (SNIP). This program provides participants with many computer and network security courses and allows them to contribute to a number of offices that have a CNO mission. During these tours Mr. Smith contributed technically to several research efforts and productizing CNO tools. Additionally he delivered numerous classified briefings of his research findings to large government audiences.
Mr. Smith holds a Masters of Science degree in Computer Science from Johns Hopkins University, and a Bachelor of Science degree in Electrical Engineering and Computer Science from the University of California, Berkeley. He also holds a Top Secret security clearance.
Super Early:
Ends Mar 15 |
Early:
Ends May 1 |
Regular: |
Late: |
Onsite: |
$3500 |
$3600 |
$3800 |
$4000 |
$4300 |
Black Hat USA 2009
July 25-30
Caesars Palace
Las Vegas, NV
Training July 25-28
Briefings July 29-30
Black Hat USA Briefings Main page is online now.
Find out about our 2009 venue, Caesars Palace.
Black Hat Webcasts
On the third Thursday of every month, Black Hat does a free infosec webcast. Meet security thought leaders and get your questions answered.
Can't make it to our live webcast events? Subscribe to the Black Hat Webcast RSS feed and take the webcasts with you in podcast form.
Upcoming Topics
Black Hat Social
LinkedIn
LinkedIn members can join our Black Hat Group and post news articles of interest to the community, make connections and discuss security topics.
Facebook
We have a Facebook fan page now. Please check us out there - share your ideas, your photos, and your videos with us.
Flickr
Check out our Black Hat photostream. Comment. Contribute. Got great pix? Share with the community.
Twitter
Find out what's going on with Black Hat in real time by following us on Twitter. Meet other Black Hat speakers and attendees, share what matters to you.
Delicious
When something in the news catches our eye at Black Hat HQ, we post the link on Delicious.