Course Overview

New malware is being created every day and poses one of the greatest threats to computer systems everywhere. In order to infect Windows, Linux, and Mac OSX, malware authors create cross-platform malware using .NET and Java. This course will introduce you to the basics of how to analyze .NET and Java malware - one of the most common and popular ways to create cross-platform malware. If you are a beginner just starting out on malware analysis and wish to gain fundamental knowledge to analyze .NET?or Java malware, then this course is for you. It is a beginner course that introduces you to the techniques and tools used to reverse engineer and analyze .NET?and Java binaries. 

In this course, you will learn how to check and analyze malicious .NET?and Java executables for signs of?malicious artifacts?and?indicators of compromise. This is a?beginner’s course?and targeted to those who are absolutely new to this field. You will go on from zero to a proficient level in analyzing malicious .NET and Java binaries. You will learn using plenty of?practical walk-throughs. We will learn the basic knowledge and skills in?reverse engineering?and analyzing malware. All the needed tools and where to download them will be provided. We will use Flare-VM and Windows virtual machine. Flare-VM?is a popular Windows-based?Malware Analyst?distribution that contains all the necessary tools for malware analysis. All the essential theories will be covered but kept to a minimum. The emphasis is on practical and lab exercises.

By the end of this course, you will have the fundamentals of malware analysis of .NET and Java under your belt to further your studies in this field. Even if you do not intend to take up malware analysis as a career, still the knowledge and skills gained would enable you to check executables for dangers and protect yourself from these attacks. 

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/Reverse-Engineering-Malware-Analysis-of-.NET-Java

What You Will Learn

  • Decompile .NET and Java Binaries
  • Detect Malware Artifacts and Indicators of Compromise
  • Disassemble .NET binary to IL language
  • Learn to perform static analysis of .NET and Java Executable
  • Static Analysis of .NET and Java Executable
  • Learn how to analyze Ransomware
  • Learn to analyze Spyware Trojans and Info-Stealers
  • Identify native files vs. .NET and Java Files

Program Curriculum

  • Install a Virtual Machine
  • Configuring the Virtual Machine
  • Installing Tools: FlareVM
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 01 Quiz

  • Principles of .NET and Java Malware Analysis
  • Chapter 02 Quiz

  • Installing ILDASM and ILASM
  • Chapter 03 Quiz

  • Principles of .NET Analysis
  • Lab Demo: Disassembling with ILDASM and Patching with ILASM
  • Chapter 04 Quiz

  • Installing dnSpy
  • Chapter 05 Quiz

  • Using dnSpy for the First Time
  • Chapter 06 Quiz

  • Lab Demo Instructions on Reverse Engineering .NET Executables
  • Lab Demo Walkthrough: Reverse Engineering .NET
  • Chapter 07 Quiz

  • Lab Exercise: Principles of Analyzing a .NET Ransomware
  • Lab: Reverse Engineering .NET Ransomware - Part 1
  • Lab: Reverse Engineering .NET Ransomware - Part 2
  • Chapter 08 Quiz

  • Dynamic Analysis of .NET Trojan - Part 1
  • Dynamic Analysis of .NET Trojan - Part 2
  • Static Analysis of Trojan Spyware - Part 1
  • Static Analysis of Trojan Spyware - Part 2
  • Chapter 09 Quiz

  • Principles of Java Bytecodes
  • Chapter 10 Quiz

  • Reverse Engineering Java Binary Using ByteCode Viewer
  • Lab Practical Demo: Reverse Engineering and Malware Analysis of Java Binary
  • Lab Practical Demo 2: Reverse Engineering and Malware Analysis of Java Binary
  • Chapter 11 Quiz

  • Principles of Analyzing a Java RAT
  • Lab Exercise Walkthrough: Analyzing a Java RAT (Crossrat Trojan)
  • Chapter 12 Quiz
Load more modules

Instructor

Paul Chin

Paul Chin is a semi-retired college lecturer with more than 20 years’ experience in teaching computing and information technology. His interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality, and well-being. In his spare time, he also plays the piano and keyboard. He enjoys teaching face-to-face and online and also loves educating and inspiring others to succeed and live the life of their dreams.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8