Introduction to Malware Analysis and Forensics with Kali Linux

This page keeps all original information and links. Japanese page

Training →Wireshark Open Seminar Education Partners →Books →Conference Speaking →Certifications
VirtualizationQt DevelopmentOpen Seminar ArchiveWireshark Track RecordCyber ​​security track record Information Processing Engineer Exam

List of seminars Past Seminars

Malware2

Course Code: Malware-2 Introduction to Malware Analysis and Forensics with Kali
Takeshita, who will be giving practical training and giving lectures at DEFCON, will hold an open seminar on
Malware analysis using Kali Linux.
We will perform static and dynamic analysis of malware using Kali Linux.
You will also learn the basics of forensics using open source tools.

Malware2
Seminar name/code
Date/time
Overview

Introductory seminar on Malware analysis using packet captureNew
(Code:Malware
-1)

1 day
(10:00-18:00)

Takeshita, who gives practical training and lectures at DEFCON Packet Capture Village, will be holding an open cyber security seminar held by the Self-Defense Forces and the Ministry of Defense.
Learn the basics of malware analysis and digital forensics by utilizing dynamic analysis, static analysis, and forensic tools included in Kali Linux.

Textbook and equipment used
Lecturer
Purpose

★Distribution
Kali Linux latest version
・Resume material
・CD-ROM
・USB memory
・Ikeriri bag
・Ikeriri magnet


MegumiTakeshita
Megumi Takeshita

Ikeriri★Network Service Co., Ltd.

learning-photo1


This is a seminar to learn the basics of malware analysis and forensics using Kali Linux. Learn the basics and forensic techniques of Windows, Linux, and Android malware analysis using open source tools.

Examining Windows and Linux programs and memory/obtaining memory dumps
Learn the flow of malware analysis by utilizing open source tools included in Kali Linux to acquire malware, surface analysis, dynamic analysis, and static analysis without using expensive commercial products.

Manipulate Windows/Linux/Android disk images and memory dumps and use digital forensic tools to analyze the contents, verify operations, confirm information, and restore data.

*The seminar will use actual malware for detection and analysis. It is detected as a malicious tool by many antivirus software, antimalware tools, VirusTotal, etc. Please be careful when handling capture files. (important)

Seminar details New

Malware analysis flow
Obtaining malware Surface analysis
Dynamic analysis Static analysis

Investigation of Windows and Linux (dynamic analysis)
Obtaining and checking process and memory dumps

Static analysis of Android malware
apktool/dex2jar/jad/javasnoop

Important Notice
This seminar uses Kali Linux to learn malware analysis. Creating or distributing actual malware
violates the Unauthorized Computer Access Act, as well as criminal and civil laws, and may be subject to punishment. This seminar is all about understanding the behavior of malware and using Kali Linux to detect, analyze, and defend against it. Please confirm and agree to this

Basics of Digital Forensics

Basics of image manipulation

Hash comparison using hashdep
Rootkit inspection using chkrootkit
Disk operation history verification and restoration using Autopsy
Data extraction using binwalk
Data extraction using bulk-extractor

*The seminar will use actual malware for detection and analysis. It is detected as a malicious tool by many antivirus software, antimalware tools, VirusTotal, etc. Please be careful when handling capture files. (important)

List of seminars Past Seminars

Copyright Ikeriri Network Service Limited,All Rights Reserved.

English articles of incorporation Privacy policy site map search inquiry