
Sign up to save your podcasts
Or

Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 1: Defeating Malware Obfuscation: Fundamentals, Impact

In this lesson, you’ll learn about:- The Purpose of Code Obfuscation:
- Defining obfuscation as the practice of intentionally making software difficult to read or analyze.
- How malware authors use obfuscation to hide strings, functions, payloads, and command-and-control communication.
- The concept of “raising the bar” for analysts by increasing the time and effort required to understand malicious intent.
- Legitimate uses of obfuscation for protecting intellectual property in commercial software.
- Obfuscation Across Programming Architectures:
- The differences between native code (C, C++, Assembly) and interpreted or managed code (Java, .NET, Python).
- Why native binaries are harder to analyze due to reliance on disassembly rather than source-like output.
- How interpreted code can often be decompiled into structures that closely resemble the original source, making it generally easier to reverse.
- Common Obfuscation Techniques:
- Using meaningless variable and function names to disrupt manual analysis and signature-based detection.
- Injecting junk code that adds complexity without affecting functionality.
- Hiding indicators through string encoding or encryption that only resolves at runtime.
- Manipulating control flow with misleading jumps and unreachable branches to confuse analysis tools.
- Skills, Environments, and Tools for Deobfuscation:
- The importance of understanding Assembly language, the Windows API, and the Portable Executable (PE) format.
- Setting up safe analysis environments using Windows and Linux virtual machines, including REMnux.
- Leveraging industry-standard tools such as IDA Pro, Ghidra, dnSpy, JD-GUI, and debuggers for static and dynamic analysis.
You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy ...more
View all episodes
By CyberCode Academy
Course 20 - Malware Analysis: Identifying and Defeating Code Obfuscation | Episode 1: Defeating Malware Obfuscation: Fundamentals, Impact

In this lesson, you’ll learn about:- The Purpose of Code Obfuscation:
- Defining obfuscation as the practice of intentionally making software difficult to read or analyze.
- How malware authors use obfuscation to hide strings, functions, payloads, and command-and-control communication.
- The concept of “raising the bar” for analysts by increasing the time and effort required to understand malicious intent.
- Legitimate uses of obfuscation for protecting intellectual property in commercial software.
- Obfuscation Across Programming Architectures:
- The differences between native code (C, C++, Assembly) and interpreted or managed code (Java, .NET, Python).
- Why native binaries are harder to analyze due to reliance on disassembly rather than source-like output.
- How interpreted code can often be decompiled into structures that closely resemble the original source, making it generally easier to reverse.
- Common Obfuscation Techniques:
- Using meaningless variable and function names to disrupt manual analysis and signature-based detection.
- Injecting junk code that adds complexity without affecting functionality.
- Hiding indicators through string encoding or encryption that only resolves at runtime.
- Manipulating control flow with misleading jumps and unreachable branches to confuse analysis tools.
- Skills, Environments, and Tools for Deobfuscation:
- The importance of understanding Assembly language, the Windows API, and the Portable Executable (PE) format.
- Setting up safe analysis environments using Windows and Linux virtual machines, including REMnux.
- Leveraging industry-standard tools such as IDA Pro, Ghidra, dnSpy, JD-GUI, and debuggers for static and dynamic analysis.
You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy ...more