Mr ADHOKSHAJ MISHRA
is mostly a self taught guy who is interested in computers since early childhood. Currently he is working in field of information security (cryptology and malware to be precise).
About Course
In this course, following topics will be covered:
0) Why study malware techniques?
1) Quick walk through internals of Linux
- a) Process and process management
- b) Thread
- c) Procfs
- d) Shared objects
- e) ELF Format
- f) ELF Loader
- a) Process and process management
- b) Thread
- c) Procfs
- d) Shared objects
- e) ELF Format
- f) ELF Loader
2) Injection techniques
- a) Controlling the ELF Loader
- b) Overriding the ELF Loader
- c) Injecting shared object
- d) Injecting native code
3)Hooking techniques
- a) Function hooking
- b) Parameter poisoning
- c) Hooking POSIX calls
4) Anti-Debugging techniques
- a) Detecting presence of debugger
- b) Preventing debugging
5) Persistent Techniques
- a) User level persistence
- b) System level persistence
6) Anti-Reversing Techniques
- a) Encoded payload
- b) Encrypted payload
- c) Overlapping machine codes
7) Self-Debugging Code
- a) Ptrace
- b) Tracing a process
- c) Setting breakpoint
- d) Handling debugger events
- e) Controlling target process
8) Countermeasures
- a) Function hooking
- b) Parameter poisoning
- c) Hooking POSIX calls
4) Anti-Debugging techniques
- a) Detecting presence of debugger
- b) Preventing debugging
5) Persistent Techniques
- a) User level persistence
- b) System level persistence
6) Anti-Reversing Techniques
- a) Encoded payload
- b) Encrypted payload
- c) Overlapping machine codes
7) Self-Debugging Code
- a) Ptrace
- b) Tracing a process
- c) Setting breakpoint
- d) Handling debugger events
- e) Controlling target process
8) Countermeasures
- a) User level persistence
- b) System level persistence
6) Anti-Reversing Techniques
- a) Encoded payload
- b) Encrypted payload
- c) Overlapping machine codes
7) Self-Debugging Code
- a) Ptrace
- b) Tracing a process
- c) Setting breakpoint
- d) Handling debugger events
- e) Controlling target process
8) Countermeasures
- a) Ptrace
- b) Tracing a process
- c) Setting breakpoint
- d) Handling debugger events
- e) Controlling target process