Introduction
آخر تحديث في: 23 أغسطس 2024
تعديل هذه الصفحة على GitHubآخر تحديث في: 23 أغسطس 2024
تعديل هذه الصفحة على GitHubThis learning path will prepare you to start on the journey of analyzing malware. Note that this is one of the hardest areas of security to master, but incremental progress will give results. The general goal of malware analysis is to characterize new malware, both brand new malware and variants of existing ones. The desired end result is a characterization of the capabilities of the malware, a guess at what threat actor(s) is using it, and a set of IoCs (indicators of compromise) that will allow others to detect the malware.
A few things to keep in mind as you go through this learning path:
Practitioners will learn how to:
Device compromises and data exfiltration through desktop and mobile malware
This learning path is an advanced one. Prior to undertaking it, learners should:
You will require a device which is powerful enough to run a virtual machine. We recommend using a machine with an x86 processor and at least 8GB of RAM.
You will require sufficient free disk space and bandwidth to be able to run and install a Linux virtual machine. While REMNux and Kali Linux are ideal, other distributions could also work, though they might require additional work with manually installing tools.
If you already have your own malware analysis virtual machine environment set up, you can use it. If not, we will guide you through the setup process in subtopic 1.
We strongly recommend treating the Detecting Malware and Detecting, Tracking, Investigating Malicious Infrastructure learning paths as prerequisites to this one. Some malware is delivered as a web application or a browser exploit. Some of the skills covered in the Web Security Fundamentals learning path will help you with web-based malware analysis.
تهانينا على انتهاء المقدمة!
وسم المربع لتأكيد قراءتك للمقدمة والمتابعة إلى الوحدة التالية.
يوسم المقدمة كمكتملة ويحفظ التقدم للمستخدم.
لقد أكملت جميع الوحدات في مسار التعلم هذا.