PaulDotCom mailing list archives

Re: Malware reverse engineering


From: Charles Watathi <charleswatathi () gmail com>
Date: Sun, 30 Jan 2011 07:06:37 +0300

Hi Mosh,

For malware reversing, I highly recommend lenny zestler`s site. He trains
for sans and he usually has some really good material. He also released
remnux2 an iso specifically suited for malware analysis.
http://zeltser.com/<http://zeltser.com/reverse-malware/malware-analysis-webcast.html>
There also some blogs I follow such as
http://contagiodump.blogspot.com/
http://www.kahusecurity.com
http://resources.infosecinstitute.com/articles/Malware/
http://krebsonsecurity.com
http://blog.didierstevens.com/

But for me the best resource so far has been the forensics challenges
at honeynet.org.
<http://honeynet.org.%20>They have good challenges which teach you by
practicing . There are so many resources out there regarding malware. Also
there is a good book which you can buy called the malware analyst cookbook.



On Fri, Jan 28, 2011 at 11:34 PM, Mosh <moshhax0r () gmail com> wrote:

Hi There

I really want to learn to do a reverse engineering for malware, but i
don't have money to do a course :-(, so maybe you can help me with this, i
appreciate all your comments:

i Have two questions:

What should be the process for a detail analysis of malware function ?
Do you know about some tools ?


Thank you so much and sorry for the bad english


Mosh

_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com




-- 
Regards
Charles Watathi
http://netsecuritystuff.blogspot.com
_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Current thread: