From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Analyzing malware

Analyzing malware

- Analyzing malware involves a combination of static and dynamic analysis techniques in order for you to understand the behavior of the malware, the functionality, and the potential impact that it will have, not only in a system but in the organization as a whole. Now, let's go over a pretty in-depth overview of the tools that are commonly used for malware analysis in here. So there are static analysis, which are the use of disassemblers, decompilers, things like IDA Pro, Ghidra and so on. And as a matter of fact, before going to this demo that you see in the screen, let me actually go back to my hacker repo. So the hacker repository that we've been using throughout the course. And then within this environment we have a section dedicated for reverse engineering. And if I come here to reverse engineering, I have a lot of links around these types of tools that can be used for static analysis to then be able to disassembler, decompile and debug different applications. So have from hex…

Contents