Thanks a lot for subscribing to our reverse-engineering training aimed at beginners! This page contains all materials you will need to follow the course and will guide you through the steps needed to set up your work environment.
The first thing you will need is a virtual machine running Windows – official images can be downloaded freely from this page. You can choose whichever hypervisor you prefer (VirtualBox, VMware, etc.) or already have installed, it doesn't matter. Importing a virtual machine is usually as simple as double-clicking on the .OVF file contained in the downloaded archive.
Virtual machines distributed by Microsoft already contain most of the development tools we need (such as Visual Studio, Git, etc.), but we still need to add the reverse-engineering tools used throughout the course. Before you're able to move on with the videos, you will have to download and install the following software inside the VM:
Program | Download page | Description |
---|---|---|
IDA Free | https://hex-rays.com/ida-free/#download | Disassembler, used to display the assembly instructions contained in analyzed programs |
x64dbg | https://sourceforge.net/projects/x64dbg/files/snapshots/ | Debugger, runs programs instruction by instruction and displays the contents of registers and memory |
010 Editor | https://www.sweetscape.com/download/010editor/ | Hexadecimal editor (30 day trial) |
Rust & Cargo | https://www.rust-lang.org/tools/install | Toolchain used to compile Rust programs, for Track 8 of the course |
Manalyze | https://manalyzer.org/static/manalyze_x64.zip | Static analyzer, displays information contained in the various headers of PE files |
setdllcharacteristics | https://blog.didierstevens.com/2010/10/17/setdllcharacteristics/ | Utility that allows you to easily disable ASLR in compiled programs |
The samples used in this training are hosted in this repository and can be downloaded directly as a ZIP archive, or with the following command:
git clone https://github.com/KasperskyLab/xtraining-re101.git
This repository contains one folder for each of the course's track, with all the corresponding source code and exercises.
Please note that the sample for Track 9, which is a (fake) malware to analyze, is stored in a password-protected archive to prevent triggering security solutions. As is tradition, the password for this archive is infected
.
Virtual machines being deployed on student hardware outside of our control, we will not be able to provide assistance related to the use of your hypervisor – whichever it is. Please only open GitHub tickets to report issues with these instructions or the files distributed for the course. Inquiries regarding the videos, exercises and solutions to the exercises should be directed to the Xtraining support staff directly.