Syllabus
Steganography in images, Spatial and transform domain steganography: S-tool, J-Steg, OutGuess. Steganalysis, Steg Firewall to prevent malware. Program Analysis: Static-Dynamic- Information Flow- Assembly programming, identify common techniques and approaches for reverse engineering, disassembler, and debugger aided debugging, identifying and defeating anti-disassembly techniques, anti- debugging techniques, code obfuscation. Windows PE file format overview, Windows API & COM overview, Malware persistence mechanisms (Registry by means of service, Trojans, DLL load order hijacking), Rootkits, Privilege elevation mechanisms used by malware, Malware execution (DLL injection, Process replacement, using Hooks and APC), Malware data encoding (common ciphers, custom encodings, Packers YARA rules. Familiarizing with the tools: Ghidra, IDA Pro, and GDB Debugger.