QSP Labs
Malware analysis & Reverse engineering
Victor Sergeev
Consultant, Malware Analyst, Kaspersky Lab
03.12.2015, 13:00-15:00, 04.12.2015, 14:00-18:00
HSB5 Seminar Room, Technikerstraße 13b, Innsbruck
In this course, we will discuss different techniques that malware
analysts use in their day-to-day work for detecting different
malicious samples: Trojans, which steal user’s credentials and
passwords, rootkits, which hide themselves in operating system,
and exploits, which use software vulnerabilities for privilege
escalation and arbitrary code execution. Students will know how to
debug, monitor and read disassembly listing of unknown
executables. Shellcode injection techniques, malicious scripts
deobfuscation methods and command & control server simulation are
also in the scope.
Language: English
Structure:
Exercises with laptops
Maximal number of participants: 25
Victor Sergeev is a graduate of the Bauman Moscow State Technical University (BSTMU) with specialization in information security and protection from technical espionage in enterprises and joined Kaspersky Lab in 2012. Since then his re-sponsibilities have included training and education development, focusing in teaching Reverse Engineering, Malware Analysis and Computer Forensics.