Malware reverse engineering resources are scattered through the internet and it can became a challenging task for someone who is just starting out. Tutorials, courses and books are easy to find after a few Google searches but structuring those resources properly, well that’s a completely different thing. In this article you’ll find some of those resources including books, tutorials, workshops, courses and places where you can pick up some samples to practice the knowledge you’ll be learning.

Malware Analysis and Reverse Engineering involves a lot of different topics from Operative Systems, Programming, Cryptography, Networking and many more. Most of the concepts you’ll face while learning how to take these binaries apart will also become valuable in other security topics including offensive and defensive.

Malware Analysis Books

There are bunch of books on Malware Analysis and over the last couple of years, the number of available options have increased a lot. A quick search on Amazon might show some of the available options that you can start with, and you ‘ll have also a lot of options for learning Assembly, Network Detection and other tools used for this.

If you’re looking for some specific book recommendations here is my list:

In my opinion these three books will give a good base for starting on Malware Analysis and they’re part of a must in any Analyst’s Library. There are plenty more involving other platforms as this list is mostly oriented to Windows Malware and x86. With mobile devices and IoT being at the center of the scene, ARM, Android and other technologies will also be topics you’ll need to cover.

Online Resources: Courses, Videos, Workshops and Blogs

The internet is full or resources where to learn about different topics, and with an enormous amount regarding Information Security and specifically Malware Analysis. As I don’t tend to write another Malware Analysis training (I did that when I was at ESET), I’ll share a list of really valuable content and some of the resources that I believe have actionable and specific content for you to go through.

In my opinion for a resource to be really helpful it should include lectures, reading, source code or samples and practice, lot’s of practice. One of the most important things you’ll need to achieve for Reversing Malware is actually reversing a lot of samples and also creating your own malware code while you’re ramping up.

Open Security Training

From the many resources available I always point peers and people to one of the most useful sites I’ve found about a lot of security topics: Open Security Training. The content on this site covers a wide and detailed list of resources for any Security Enthusiast from x86, Cryptography, Network Detection, ARM, Malware Analysis, Exploiting to Cellular Networks and even more.

Courses are at least one day long, and slides, samples and videos are available for you to go through at you own pace. Some of the courses that I recommend for anyone Interested in Malware Analysis include:

Beginner classes

Tools & Resources For Practice

You won’t have to reinvent the wheel for every single technique you learn and with time you’ll be able to come up with your own set of favourite tools for any given task. The number of tools out there for you to try it’s expanding every day. A few resources might help you to keep on track with up to date information and where to find challenges to apply all the knowledge you’ve collected.

Here you’ll find a few I normally use:

Tools and repo’s

Finding Malware Samples & CTF Challenges

There will be a time where you’ll need to find more samples or challenges to keep learning about specific topics or learn to deep dive into some real world malware. Finding curated lists of malware samples for you to analyse it’s not that hard. Here’s is a list for places where you can look for live malware to analyse or where to find other RE challenges:

Conclusion

There is no end of the path to Malware Analysis or Reverse Engineering as new technologies and techniques are coming out every day. It is possible and useful to come up with a common ground of knowledge that will help you to walk through this maze. Continuous practice and learning are ways to keep up to date and be aware of any new piece of malware that might end up in front of you. In Reverse Engineering Practice is key, and having a good list of resources and tools for practice it’s the best way to start so please let me know if I missed anything.

Happy hunting!

The awesome image used in this article is called 'Midnight Engineer' and was created by Anuj.
源链接

Hacking more

...