|Reverse Code Engineering Training Reverse Code Engineering
is a critical task for people such as protection developers,
malware analysts or exploit developers. IITAC provides sophisticated
training for security professionals to increase analysts abilities
IDA Pro Training IDA Pro is THE state of the art tool for analyzing
malware. IITAC trains participants to work with IDA Pro efficiently
including all necessary knowledge domains such as plugin development,
IDA scripting, and more. Of course any training finalizes with
a certification according to ISO/IEC 17024!
Malware Analysis Training A professor said once to me: “All
students dealing with malware just need to know one thing -
knowing about signatures…”. If this is not sufficient for your
(of course it is not) we offer extensive, professional and sophisticated
training in the field of malware analysis. Of course we deal
with newest techniques, tricks and methods including bot nets.
Get beyond boring information!
Copy Protection Training Our long term experience in the Application
Security field can help you by offering the right knowledge
and the experience for either creating your custom, home-brew
protection or by integrating and extending properly to its best
a commercial protection in your software.
Tiger Team Training IITAC does not only offer highly qualified
tiger teams for outsourcing the advanced security analysis of
your software or your network through qualified audit services,
but also offer you the needed training for creating -over the
time- an highly qualified tiger team. OffensiveC0ding section
evilcodecave wrote 1 day ago: Hi there, I’ve opened a new section
in my Website, called OffensiveC0ding. I’m going to … more →
Tags: Insecurity, C / C++ (Visual Studio Based) Coding, Driver
Coding, Evilcry, OffensiveC0ding, section opened, Spy/Surveillance
evilcodecave wrote 6 days ago: Hi there, In the last period,
malware evolved to new Detection Ways, like Sandbox Awareness,
if a ma … more →
Tags: Insecurity, Sandbox Aware, Sandbox Detect, Sandboxie,
threatexpert, JoeBox, CWSandbox, Anubis, sbiedll.dll
NtSetDebugFilterState as Anti-Dbg Trick Reverse Engineering
evilcodecave wrote 3 weeks ago: Hi, Here you can download
my last paper related to NtSetDebugFilterState UndocumentAPI
that can be … more →
Tags: C / C++ (Visual Studio Based) Coding, Anti Debug Trick,
Anti-Dbg, DbgPrint, DbgSetDebugFilterState, Filter Debug Messages,
NtSetDebugFilterState, Reverse Engineering, Windows Internals
End Year - New Year — 1 comment
evilcodecave wrote 1 month ago: Hi there people! Another year
seems passed! definitely a Good Year..and I hope a better
2009 In t … more And it's also a powerful tool that professionals
use to analyze the security strength of their applications.
We're talking about reverse code engineering.
If you've never considered rolling up your sleeves and sinking
your hands into learning how certain system drivers and newly-found
malware applications work, now is the time. Reverse engineering
can be a powerful way for security professionals to ensure
and to keep systems safe.
Reverse code engineering is the process of examining exactly
how a software application, or component, actually works.
While malcontents reverse engineer software to find weaknesses
in systems and design spyware, illegal adware, and trojans,
the same techniques can be used by security practitioners.
In this way, they can perform a forensic analysis on a virus
or a spyware-infected system to learn just how much of a threat
the malware really is. Was it simply semi-harmless adware?
Or was the program capable of capturing every keystroke typed
on the system? Proficient reverse engineers also can use this
tactic to create on-the-fly signatures to be deployed in their
intrusion detection/prevention systems, as well as insightful
application penetration assessments.
Tags: Driver Coding, Techlife, ACPI Project, AcpiOsDerivePciId,
freebsd, new year 2009, Submit Virus Samples, Thread Deadlock
Barrier ( TDB) Implementation to Enhanc
Backdoor.Win32.UltimateDefender Reverse Engineering
evilcodecave wrote 1 month ago: Hi, I’ve released Backdoor.Win32.UltimateDefender.gtz
Reverse Engineering on my Website: http: … more →
Tags: Debugging & Disassembling, malware, Analysis, Rootkit,
Reverse Engineering, Backdoor.Win32.UltimateDefender.gtz,
install.exe, AntivirusPro2009.exe, figaro.sys
Information Security Training Information security is one
of the no. 1 top risks in nowadays business. Get trained by
professional IITAC trainers with focus on modern information
security field, such the BS1799, ISO/IEC 17799 or the new
information security standard family ISO/IEC 2700x. IITAC
information security training does not rely on these standards
but include them and surround them with experienced knowledge
from business process management real world.
Certification acc. to ISO 17024 ISO/IEC 17024 intent is providing
a framework for accreditation and certification organisms
a certification program for individuals and as the standard
against which a Third Party can validate the management system
for certification of persons. Every IITAC certification complies
with this standard and is according to ISO/IEC 17024!
Personalized and 1-1 Training You are working in a high secure
business? Or you do not like group training because you do
not want to tell other that you get trained? IITAC offers
special courses for persons interested in a 1-1 training.
Just 1 participant with 1 professional IITAC trainer. Via
web conferencing system or direct live training. Full non-disclosure
of you person is of course included!
Build security staff on limited budget It’s possible to build
a more secure organization even on a tight budget. Assess
your IT staff for security knowledge. Develop or hire a senior
leader to oversee security requirements. Hire selectively
and build fields of knowledge and expertise. Provide ongoing
training and obtain certifications. Develop a sourcing strategy.