This training is free and for women only as per Blackhoodie standards. It will be held in two 2 hour sessions on consecutive days and has a cap of 10 participants. Registration: Reach out to firstname.lastname@example.org.
Following Blackhoodie's guidelines regarding COVID, we require proof of vaccination and attendees to wear masks during the workshop
Topics that will be covered: - Understanding the PE file format - Using disassemblers like Ghidra or IDA - Recognizing some common malware routines (tricks used to stay persistent, obfuscation, etc)
If time permits, there will be a chance to learn how to use scripts to augment and make the experience of static analysis easier.
- Comfortable with x86 assembly language.
- Comfortable with some programming languages.
- Some knowledge of how a CPU works.
- Machine with VMs installed (instructions will be emailed before the workshop).
Suweera De Souza Senior Security Researcher, CrowdStrike
Suweera has over a decade of experience in reversing malware and botnet analysis. She previously volunteered giving a BlackHoodie workshop at NorthSec and workshops for CyberAegis, a local community in Montreal. Currently Suweera is employed as a Senior Security Researcher at CrowdStrike where she focuses on botnets such as Bumblebee and BokBot.