Workshop – Reverse Engineering of Malicious Scripts on Windows

Today, as part of the C-Days Conference, I attended a very interesting Workshop, related to reverse engineering of malware, presented by a member of CERT.PT (Computer Emergency Response Team), part of the Portuguese National Cybersecurity Centre.

Description

This workshop offers a hands-on approach to reverse engineering malicious scripts on Windows systems, covering JavaScript, VBS, and Powershell. Aimed at cybersecurity technicians, this workshop ranges from static and behavioral analysis to manual deobfuscation techniques using Python. The objective is to enable participants to identify, analyze and collect IoCs of these threats, thus enabling them to mitigate what is one of the most common types of malware used as an entry vector to compromise organizations.

Contents

  • Strings static analysis with strings, pestr and FLOSS
  • Execute and deobfuscate JavaScript using SpiderMonkey
  • Powershell deobfuscation and debugging with Cyberchef and PS IDE
  • Capturing malware events by tracing AMSI
  • Layout and Data deobfuscation using Python

Certificate of participation.

Heading to C-Days 2024, Cybersecurity conference!

Its next week that C-Days 2024, the biggest Cybersecurity conference in Portugal, organized by the Portuguese National Cybersecurity Centre will happen in Coimbra, Portugal, on the 18th, 19th and 20th of June!

Under the theme of “More Prevention”, this event marks the 10 years of the Portuguese National Cybersecurity Centre, and there will be a talk “looking back” at the past and looking forward towards the future of the organization.

I’m also particularly interested in the “Reverse Engineering Malicious Scripts on Windows” Workshop, presented by Duarte Mortágua from CERT.PT!

I’m already registered for the conference, and looking forward to ti!
Anyone interested can register at the official website:
www.c-days.cncs.gov.pt

Cybersecurity Book Bundle, by Humble Bundle!

UPDATE: This bundle is no longer available!

In this book bundle from Humble Bundle, you will get 18 books related to Cybersecurity, published by Pearson, ranging from topics like CompTIA Security+, Network Security, Zero Trust Architecture, Microsoft Sentinel and Microsoft Defender for Cloud.

Full list of books:

  • CompTIA Security+ SY0-701 Cert Guide
  • Network Security
  • Zero Trust Architecture
  • Cybersecurity Myths and Misconceptions
  • In Zero Trust We Trust
  • Database and Application Security: A Practitioner’s Guide
  • Ransomware and Cyber Extortion
  • Designing and Developing Secure Azure Solutions
  • The Modern Security Operations Center
  • A Practical Guide to Digital Forensics Investigations
  • Data Breaches
  • Microsoft Defender for Cloud
  • Microsoft Sentinel
  • Effective Cybersecurity
  • Information Privacy Engineering and Privacy by Design
  • Building a Career in Cybersecurity
  • Microsoft Azure Network Security
  • Securing 5G and Evolving Architectures

Get the bundle now! It expires in less than 48 hours!

Workshop CSIRT-in-a-box

Today I attended the online Workshop CSIRT-in-a-box, as part of the CSecurity 2024, a Cybersecurity Conference.

It was an interesting presentation, mentioning the process and some tools related to setting-up a CSIRT (Cyber Security Incident Response Team).

I am now a Certified Ethical Hacker!

I am very happy to announce I just became a Certified Ethical Hacker (CEH), after passing the 4-Hour exam!

The exam covered the following topics from the course:

  • Module 01: Introduction to Ethical Hacking
  • Module 02: Footprinting and Reconnaissance
  • Module 03: Scanning Networks
  • Module 04: Enumeration
  • Module 05: Vulnerability Analysis
  • Module 06: System Hacking
  • Module 07: Malware Threats
  • Module 08: Sniffing
  • Module 09: Social Engineering
  • Module 10: Denial-of-Service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT and OT Hacking
  • Module 19: Cloud Computing
  • Module 20: Cryptography

Certificate

Verification