QSP Labs

Malware analysis & Reverse engineering

Victor Sergeev
Consultant, Malware Analyst, Kaspersky Lab
03.12.2015, 13:00-15:00, 04.12.2015, 14:00-18:00
HSB5 Seminar Room, Technikerstraße 13b, Innsbruck

Lab Description

In this course, we will discuss different techniques that malware analysts use in their day-to-day work for detecting different malicious samples: Trojans, which steal user’s credentials and passwords, rootkits, which hide themselves in operating system, and exploits, which use software vulnerabilities for privilege escalation and arbitrary code execution. Students will know how to debug, monitor and read disassembly listing of unknown executables. Shellcode injection techniques, malicious scripts deobfuscation methods and command & control server simulation are also in the scope.

Language: English
Structure: Exercises with laptops
Maximal number of participants: 25

About the Expert

Victor Sergeev is a graduate of the Bauman Moscow State Technical University (BSTMU) with specialization in information security and protection from technical espionage in enterprises and joined Kaspersky Lab in 2012. Since then his re-sponsibilities have included training and education development, focusing in teaching Reverse Engineering, Malware Analysis and Computer Forensics.