Contact us Get Quote

Reverse Engineering & Malware Analysis

We conduct hands-on training and workshop on Reverse Engineering & Malware Analysis. We have conducted this training in the past during Nullcon Security Conference.


The objective of this program is to introduce participants with basic knowledge of programming, debugging and x86 assembly language to the art of Software Reverse Engineering and Malware Analysis. Various use-cases for Reverse Engineering and Malware Analysis along with live examples will be demonstrated during the session in order to impart a practical and result oriented training to the participants. The entire session will focus only on Win32 Platform however most of the techniques discussed are applicable for Win64 platform as well and some of them even for Linux or other Operating System platforms. Multiple CTF like challenges will be provided during the workshop in order to encourage the participants to try out various tools and techniques discussed during the session.

Course Content

Win32 Platform Overview

  • Platform Components Overview
  • Process Tracing and Analysis Tools
  • API Hooking Techniques
  • Debugging Tools for Windows
  • Scripted Debugging

PE File Format Overview

  • Headers, Sections, IAT, Exports, Relocation Table etc.
  • PE Loader Workflow
  • Custom PE Loader Development

x86 Assembly Language

  • Quick Introduction to x86 Architecture and Platform Components
  • x86 Assembly Programming Basics
  • Static Analysis using IDA Pro
  • Program Disassembly and Walkthrough
  • Control Flow Graph & Call Graph
  • Bypassing Anti-Disassembler Techniques

Dynamic Analysis

  • Sysinternals Suite
  • Win32 Debugging API
  • Scripted Debugging & Process Analysis
  • Dynamic Binary Instrumentation using PIN

Malware Analysis Techniques

  • Introduction to Malware Classes
  • Dynamic Analysis of Malwares
  • Online Anti Virus Scanning Services
  • Online Sandbox Services
  • Malware Classification
  • Sandboxed Analysis
  • Building your own Sandbox for Malware Analysis
  • Building a Malware Analysis Lab

Advanced Malware Analysis

  • Anti-Analysis Techniques
  • Unpacking Packed/Protected Executables
  • Rootkit Techniques
  • Rootkit Analysis using Live Memory Acquisition and Memory Forensics
  • File Format Exploit Analysis
  • Web Malware Analysis
  • Drive by Downloads

Contact us