Explore more training resources from Stephanie Domas and the Infosec Skills author team
Learning x86 disassembly gives you the “keys to the kingdom"
"It’s actually the most powerful piece of cybersecurity,” Stephanie said. “If you can control a system at its most fundamental level, you've got the keys to the kingdom."
Anti-Debugging and Anti-VM Techniques and Anti-Emulation
These days malware is becoming more advanced. We will explore some of these commonly used techniques and practices to evade malware debugging software and sandboxes.
Debugging For Malware Analysis
This article provides an overview of debugging and how to use some of the most commonly used debuggers.