1. WebAssembly Module Advanced Analysis

    • Buy now
    • Learn more
  2. Welcome & Summary

    • Welcome & Overview
    • Summary
  3. Materials

    • Day2_WebAssembly_Advanced_WebAssembly_Modules_Analysis.pdf
    • wasm_reversing_day2.zip
  4. Cryptominers Analysis and Detection

    • 1.0 - Instruction Analytics & Metrics
    • 1.1 - WebAssembly Cryptominers
    • 1.2 - Exercise #1 (Coinhive analysis)
    • 1.3 - Exercise #1 - Solution
    • 1.4 - Exercise #2 (Cryptoloot analysis)
    • 1.5 - Exercise #2 - Solution
    • 1.6 - Cryptominer Detection Techniques
    • 1.7 - Exercise #3 (YARA rules)
    • 1.8 - Exercise #3 - Solution
  5. Dynamic Module Analysis

    • 2.0 - Dynamic Binary Instrumentation
    • 2.1 - Dynamic Binary Instrumentation - Labs
    • 2.2 - CTF challenge #1
    • 2.3 - CTF challenge #1 - Solution
    • 2.4 - Reversing DBI hooks
    • 2.5 - Tracing WebAssembly Execution
    • 2.6 - Tracing WebAssembly Execution - Labs
  6. Anti-Debugging & (De)Obfuscation Techniques

    • 3.0 - Anti-debugging Techniques
    • 3.1 - Bytecode Obfuscation
    • 3.2 - Bytecode Obfuscation - Labs
    • 3.3 - Bytecode De-Obfuscation
    • 3.4 - Bytecode De-Obfuscation - Labs
    • 3.5 - Real-life Module Analysis - Example
  7. Advanced Analysis Techniques

    • 4.0 - Static Single Assignment
    • 4.1 - Decompilation
    • 4.2 - CTF challenge #2
    • 4.3 - CTF challenge #2 - Solution
    • 4.4 - Symbolic Execution
  8. Hacking WebAssembly Video Games

    • 5.0 - Hacking WebAssembly Games
    • 5.1 - Exercise #1
    • 5.2 - Exercise #2
    • 5.3 - Exercise #3
  9. Conclusion / Thank You

    • Closing remarks
    • Provide Quick Feedback Here
  1. Products
  2. Course
  3. Section
  4. Lesson

Welcome & Overview

  1. WebAssembly Module Advanced Analysis

    • Buy now
    • Learn more
  2. Welcome & Summary

    • Welcome & Overview
    • Summary
  3. Materials

    • Day2_WebAssembly_Advanced_WebAssembly_Modules_Analysis.pdf
    • wasm_reversing_day2.zip
  4. Cryptominers Analysis and Detection

    • 1.0 - Instruction Analytics & Metrics
    • 1.1 - WebAssembly Cryptominers
    • 1.2 - Exercise #1 (Coinhive analysis)
    • 1.3 - Exercise #1 - Solution
    • 1.4 - Exercise #2 (Cryptoloot analysis)
    • 1.5 - Exercise #2 - Solution
    • 1.6 - Cryptominer Detection Techniques
    • 1.7 - Exercise #3 (YARA rules)
    • 1.8 - Exercise #3 - Solution
  5. Dynamic Module Analysis

    • 2.0 - Dynamic Binary Instrumentation
    • 2.1 - Dynamic Binary Instrumentation - Labs
    • 2.2 - CTF challenge #1
    • 2.3 - CTF challenge #1 - Solution
    • 2.4 - Reversing DBI hooks
    • 2.5 - Tracing WebAssembly Execution
    • 2.6 - Tracing WebAssembly Execution - Labs
  6. Anti-Debugging & (De)Obfuscation Techniques

    • 3.0 - Anti-debugging Techniques
    • 3.1 - Bytecode Obfuscation
    • 3.2 - Bytecode Obfuscation - Labs
    • 3.3 - Bytecode De-Obfuscation
    • 3.4 - Bytecode De-Obfuscation - Labs
    • 3.5 - Real-life Module Analysis - Example
  7. Advanced Analysis Techniques

    • 4.0 - Static Single Assignment
    • 4.1 - Decompilation
    • 4.2 - CTF challenge #2
    • 4.3 - CTF challenge #2 - Solution
    • 4.4 - Symbolic Execution
  8. Hacking WebAssembly Video Games

    • 5.0 - Hacking WebAssembly Games
    • 5.1 - Exercise #1
    • 5.2 - Exercise #2
    • 5.3 - Exercise #3
  9. Conclusion / Thank You

    • Closing remarks
    • Provide Quick Feedback Here