Elevator Pitch
this course is 100% hands-on and based on real-world samples and attack techniques. Besides the manual techniques and methods, we’ll cover open-sourced tools that make the SOC analysist day-to-day tasks much easier than writing Sigma rules for your SIEM.
Description
Introduction:
This course covers a wide range of threat hutting techniques and methods and dives into the art of Network, Web, Malware and binary analysis and exploitation techniques.
What skills you’ll gain after completing this course:
- Understanding about network analysis
- Understanding of the techniques regarding binary exploitation
- Basic knowledge about reverse engineering
- Using both tools and manual techniques for analyzing network protocols data
- Understating of malware analysis techniques.
- Web shells and threats
- Understating of kernel-level analysis
Who should take this course:
- SIEM Engineers.
- SOC analysts
- Threat hunters
- Sysadmins
- Penetration testers
Prerequisites
- Basic understating of network protocols
- Basic scripting knowledge python, bash, PowerShell, etc..
- Virtual Box
- Admin privileges on your computer
Training Outline
- Introduction to Threat hunting
- Preparing a Hunt
- Sample extraction
- Techniques and logic
Network analysis
+ ARP Analysis
+ DNS analysis
+ HTTP/HTTPs traffic analysis
+ Unknown traffic
Memory analysis
+ Understanding the memory stack
+ Introduction to debuggers
+ Reverse engineering sample (Real-world security application)
+ Analyzing memory processes
+ Kernel memory and objects
+ WinDbg and low-level analysis.
Malware analysis
* Malware evasion techniques
+ Malware persistence
+ Delivery techniques
+ UAC bypassing techniques
+ Zero-Day samples
+ Browser delivery exploits
+ Document-based malware
Web threats analysis
+ Serializations attacks with cryptographic implementation weakness
+ Web shells
+ Analyzing source code
+ Hands-on workshop
+ How and when to follow up on findings
+ How and when to escalate findings
Notes
Jameel is a master of binary exploitation and founder of a well known binary exploitation blog within the infosec community bufferoverflows.net with over 10 years of offensive security experience. he’s the head of offensive security of Capgemini.