All Tutorials

Malware Analysis Of Malicious Documents

Malware Analysis Of Malicious Documents

A Beginner’s Course on Analyzing Malicious PDF and Microsoft Office Documents Using Remnux and Windows Virtual Machines

What you’ll learn

Malware Analysis Of Malicious Documents

  • Analyzing Malicious Documents
  • Analyzing Malicious PDF documents
  • Learn Analyzing Malicious Microsoft documents
  • Install Remix Virtual Machine
  • Extracting document Meta-Data
  • Basic Linux Commands Used in Malware Analysis
  • Extracting Embedded Objects and Javascript from PDF documents
  • Extracting VBA Macro Scripts from Office Documents
  • De-obfuscating Javascript and VBA scripts
  • Automating Analysis of Documents
  • Viewing and Debugging Malicious Office Macros
  • Identifying Maker and Origin of Malicious Documents
  • Using Yara to Identify Malicious Patterns and Signatures
  • Analyzing Open Office XML Format Documents
  • Analyzing Structured Storage Format Documents
  • Estimating age and date of document creation
  • Analyzing PowerShell scripts
  • Detecting Malware Artifacts and Indicators of Compromise
  • and more…

Requirements

  • Windows PC
  • Interest in Malware Analysis
  • Basic Linux knowledge helpful but not strictly necessary

Description

Did you know that you could infect your computer just by opening a pdf or Microsoft office document? If that came as a shocker for you then you need to take this course. Documents are one of the main vectors of attacks for malware authors because of their widespread use.

Everyone uses documents to create reports, memos, and articles. In fact, everything we do for communication involves the use of documents. That is why this is a very popular way to infect computers. Documents are used as the first stage of a malware attack. Embedded in documents are scripts that will download a second-stage payload consisting of additional malware, eg ransomwareremote access tools, and more.

In this course, you will learn how to check and analyze malicious pdf and office documents for signs of malicious artifacts and indicators of compromise. This is a beginner’s course and targeted to those who are absolutely new to this field. I will take you from zero to a proficient level in analyzing malicious documents. You will learn using plenty of practical walk-throughs.

Malware Analysis Of Malicious Documents

We will learn the basic knowledge and skills in analyzing documents. All the needed tools and where to download them will be provided. By the end of this course, you will have the fundamentals of malware analysis of documents under your belt to further your studies in this field. Even if you do not intend to take up malware analysis as a career, still the knowledge and skills gained would enable you to check documents for dangers and protect yourself from these attacks.

We will use remix and Windows virtual machines. The remix is a Debian-based Linux distribution that contains all the necessary tools for malware analysis. Some background on Linux would be helpful but not strictly necessary. We will also install document debuggers in windows virtual machine. Then, I will show you how to get started with the very basic tools in remix and windows. All the essential theories will be covered but kept to a minimum. The emphasis is on practicals and lab exercises.

Go ahead and enroll now and I will see you inside.

Who this course is for:

  • Beginners to Malware Analysis
  • Students embarking on a career path to become Malware Analysts
  • Anyone eager to learn how to know if a document is malicious
  • Last updated 5/2021

Content From: https://www.udemy.com/course/malware-analysis-of-documents/

Download Now Reverse Engineering, Debugging and Malware Analysis

Recent Posts

  • Blog

Earn Money from Areena Course

In today's digital age, opportunities for earning money have expanded significantly. One avenue that has… Read More

9 months ago
  • Blog

Best Earning Apps

Earning apps have become increasingly popular as people look for ways to make money conveniently… Read More

11 months ago
  • Blog

How to Earn Money From Markaz App

In today's fast-paced digital world, opportunities to earn money online have become increasingly popular. One… Read More

11 months ago
  • All Tutorials

Full Web Ethical Hacking Course

Full Web Ethical Hacking Course Learn all about web application penetration testing! What you'll learn… Read More

1 year ago
  • All Tutorials

Build Chatbots Using Javascript

Build Chatbots Using Javascript Build Chatbots Using Javascript From Scratch What you'll learn Build Chatbots… Read More

1 year ago
  • All Tutorials

Basic Learning about Linux Daily use commands

Basic Learning about Linux Daily use commands Basic knowledge to get you started What you'll… Read More

1 year ago