Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the process of analyzing suspicious code in this 25-minute tutorial from The Cherno, where he investigates a potential malware submission received for code review. Learn how to use essential security tools including Virus Total for initial scanning, Ghidra for reverse engineering, HxD for hex analysis, and Strings for examining embedded text. Follow along as the presenter methodically breaks down the suspicious file, demonstrates security analysis techniques, and determines whether the submission actually contains malicious code. Gain valuable insights into cybersecurity practices that can help protect your systems and development environment from potential threats.
Syllabus
Did someone send me MALWARE to Code Review??
Taught by
The Cherno