60 minutes on-demand video

Access on mobile and TV

  • Certificate of completion

Go from hero to zero in being a Professional and certified android malware analyst

In the Android Malware Analysis course, participants will obtain the knowledge and skills to  Perform static malware analysis, Perform dynamic malware analysis, Detect malicious and data exfiltration code, Reverse engineer APKs, understand Android security architecture, Understand Android attack surface.
 Participants will perform these tasks by learning and implementing tools and techniques while examining malicious programs.

Bypassing Anti-Virus Using Python

What is Anti-virus:

Antivirus is a type of program used to deter, search, identify and remove viruses from your computer. When installed, most antivirus applications would immediately run in the background to provide real-time protection from virus attacks. Comprehensive virus security systems help secure the files and computers from ransomware, such as worms, Trojan horses, and spyware, and can provide additional protection, such as custom firewalls and website blocking.

What is Python:

Python is an object-oriented, high-level programming language with built-in interpreted programming language that is mainly used for web and app creation. Since it provides dynamic typing and dynamic binding solutions, it is highly appealing in the field of Rapid Application Development.  Python is relatively basic, making it simple to understand, since it includes a special syntax that emphasizes readability. Python programming is much easier to read and interpret for developers than code written in other languages. As a result, the expense of software maintenance and implementation is reduced when teams can collaborate without major language and skill obstacles.

Antivirus Types

  • Heuristic Based Defined rules and algorithms.   
  • Behavior Based Binary file behavior.
  • Signature Based Patterns generated to detect malicious activity.  
Bypassing Anti-virus:
  • OBFUSCATORS Hiding malicious code and make it hard to understand. 
  • PACKERS Reduce file size of the payload and creates new binary file.   
  • CRYPTORS Encrypting malicious programs and change its code.   
  • PROTECTORS Protecting malicious code from reverse engineering, debugging etc. 
  • PROCESS MEMORY INJECTION Injecting malware into a running process .  
  • DLL INJECTION Manipulate the execution of running process.   
  • INLINE HOOKING Adding malicious code in a program.   
  • PROCESS HALLOWING Injecting malware into suspended and hallowed process. 

Course Curriculum

Omar Rajab