You just discovered a piece of suspicious software. What are your next steps? This talk will explain the fundamentals of malware analysis and reverse engineering. These skills are increasingly needed due to the failures of signature based malware detection systems, inclusion of undesirable features in common software (grayware), and undocumented features in commercial software.
Key topics covered will include typical exploit chains, discovering indicators of compromise, common evasion and obfuscation techniques, and the use of analysis tools and techniques. A gentle introduction to assembly language and windows API calls will be given to allow the presentation to be of interest for all technical levels.