Let’s be honest… If the criminals do everything perfectly, getting your data back after a ransomware attack is nearly impossible without their key, and getting the key means paying the ransom. Is it impossible? No. But it IS highly unlikely. So, why did we bother creating Ransomware Analysis Basics? We felt:
- Attackers are human, too. They make mistakes! If there is any way to get the data back without paying the ransom, great! We’ll do that by turning the tables on the bad actors and exploiting the flaws in THEIR implementation.
- Along the way, we’ll learn the foundational knowledge needed if you’re considering a career in digital forensics such as encryption, binary exploitation, reverse engineering and much more.
Join us for a fun yet all too real scenario and learn a lot about forensics along the way.
Price = $50
This is a “Name Your Price” course. Your options include:
- Minimum Price = $25
- Suggested Price = $50
- Pay more to support our community efforts
What do I get?
Students get their own web-based virtual environment to get hands-on experience with the tools and techniques taught in the course with a Windows VM with tools already installed. It is also configured to disable any detection mechanism on the system, so it will not interfere with the user (analyst). You will also be provided with numerous samples of ransomware to rip apart in the protected virtual lab.
Ransomware Analysis Basics covers the following topics:
0️⃣ Ransomware Basics
1️⃣ Encryption Algorithms
2️⃣ Windows Crypto APIs and How to Analyze Them
3️⃣ Windows Internet APIs
4️⃣ Ransomware Helper APIs
5️⃣Can We Decrypt Ransomware?!
6️⃣ 5 Hands-On Labs
7️⃣ Wrap Up
Prerequisites for Ransomware Analysis Basics
No prior knowledge is assumed although basic Linux and familiarity with virtual machines (VMs) are recommended.
