Skip to content
Malware Incident Response Training
How To Master Malware Analysis
Course Notes
- Acquisition
- Disk
- Memory
- Packet
- Master File Table (MFT)
- Change Logs
- Volume Shadow Copies
- Prefetch
- Event lost
- Data streams
- Registry Hives
- Basic Stat Analysis – Strings
- Basic Stat Analysis – Windows Commands (APIs)
- Dynamic Analysis
- Static Analysis
Reference
Books
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Tools
- https://websploit.org/
- SFIT VM
- Flare VM
- IDA Pro
- Memory Acquisition
- Autopsy
- Plaso
- Volatility
- Cuckoo Sandbox
- SANs Cheat sheets
- Velociraptor
- Timesketch
- Kape