Reverse Engineering (Advanced)

This is an in-depth reverse engineering course and is a challenging course as
it requires you to understand the structure and principles of debuggers and analyse encrypted/obfuscated malware.

Contact us on +82-2-2671-3344

Training guidance

Reverse engineering (Advanced)
  • Training hours
  • 09:30 to 17:30 (35 hours | 5 days)
  • Training locations
  • KnK Digital Tower, 220 Yeongsin-ro, Yeongdeungpo-gu, Seoul, Korea
  • Training costs
  • Inquiry, non-reimbursement process
  • Capacity
  • 10 to 20 people
  • Remarks
  • Lecture PPT, certificate for 80% attendance

Educational purposes

To be good at reverse engineering, you need to be comfortable with the debugger.

You need to understand the principles of debuggers and learn how to control them, not just an external debugger programme. This course is an essential part of becoming an intermediate/advanced reverse engineer, so you can have your own debugger by understanding the principles of debuggers and implementing your own debugger.

The purpose of this course is to provide hands-on reverse engineering exercises for various applications using this debugger.

Training for

  • Want to dive deep into reverse engineering

  • Want to build your own debugger

  • Those who have had enough of traditional reverse engineering

Training schedule and content

Day 1

Overview and development of the debugger
  • Overview of the debugger
  • Understanding the debugger
  • Structure of the debugger
  • Developing a debugger
  • Developing your own debugger with Python
  • Controlling your own debugger with scripts
  • Automatically decompress UPX with your own debugger

Day 2

Using the debugger
  • Extending the Immunity Debugger
  • Immunity Debugger PyCommand Overview
  • PyCommand extension for the Immunity Debugger
  • IDAPython Extensions
  • Understanding Immunity Debugger PyHooks
  • Immunity Debugger PyHooks Extension
  • Automating Hooking with IDAPython

Day 3

Commercial program analysis
  • Cryptographic algorithm overview and analysis
  • Cryptographic Algorithms Overview
  • Analyze cryptographic algorithms in commercial programs
  • Cryptographic algorithm attacks
  • Writing code to attack cryptographic algorithms in commercial programs

Day 4

Analyze the latest malware
  • Overview of APT attacks
  • Understanding APT attacks
  • Analyzing OLE File Formats
  • Imunity Debugger
  • Immunity Debugger Overview
  • CreakMe Labs
  • 3.4 Practice Decrypting the DDoS Sample
  • Malware analysis (1)
  • HWP Vulnerability Analysis

Day 5

Analyze the latest malware
  • Malware analysis (2)
  • PDF Vulnerability Analysis
  • Malware analysis (3)
  • SWF Vulnerability Analysis