±Partners and Sponsors
New Today: 1
New Yesterday: 7
· Safer Internet Day
· Webmail Forensics – Digging deeper into Browsers and Mobile Applications
· Operation Endeavour: The Tip of the Iceberg?
· Forensic analysis of the ESE database in Internet Explorer 10
· WhatsApp – discovering timestamps of deleted messages
· Man In The Middle Attack: Forensics
· Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases
· Windows 8 File History Analysis
· Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection
±Follow Forensic Focus
Interested in Malware Analysis - need advice
Why would you need a course?
If by "malware forensics", you are looking to determine the effects that malware had on the system that it had infected, there are a number of resources available on the subject that don't require you to attend a course.
For example, there are two very good malware analysis books that have come out recently that go into some detail regarding monitoring or determining the effects of malware as it interacts with it's "eco-system". In my blog, I've provided a number of posts where I discuss malware characteristics and how to use those to develop an understanding of malware.
These are just a few of the resources available to you.
With some free and open source tools, some time, and some effort, you can build up quite a bit of capabilities and expertise in this area, without paying for a course.
- Senior Member
Lenny Zeltser (previously mentioned) has released a free VM specially designed for RE samples, entitled Remnux: zeltser.com/remnux/
There are several places online where you can pick up samples, or search your junk mail folder for obvious scams and use wget on the url and grab yourself one from the wild ;).
Also I can recommend the previously two mentioned titles "Malware Analysts Cookbook" and "Practical Malware Analysis" The cookbook can be quite heavy handed at times but its worth sticking with it.