To access material, start machines and answer questions login.
Malware authors are constantly looking for ways to evade detection and analysis to maintain the effectiveness of their malware. At the same time, security professionals are working to develop new methods and tools for detecting and mitigating the threat posed by malware. This ongoing "arms race" can lead to the development of increasingly sophisticated and effective malware defences as both sides seek to stay ahead of their counterparts.
- Detection
- Obfuscation using
- Anti-Debugging
Many more techniques exist, but we will focus on these three for this room.
- Learn why malware authors use anti-reverse engineering techniques
- Learn about different anti-reverse engineering techniques
- Learn the techniques on how to circumvent anti-reverse engineering using various tools
- Learn how anti-reverse engineering techniques are implemented by reading the source code
- Familiarity with Basic and Advanced (How to use a debugger, read assembly code, and patching)
- Basic knowledge of Assembly (What registers are, etc.)
- Basic understanding of C programming concepts (Conditions, program flow, etc.)
Connecting to the machine
| Username | Administrator |
| Password | Passw0rd! |
| IP | MACHINE_IP |
Ready to learn Cyber Security?
The Anti-Reverse Engineering room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
