GDG on Campus KCA University - Nairobi, Kenya
Explore the power of malware analysis. Learn practical techniques for static and dynamic analysis, Windows internals debugging, and network traffic monitoring using tools like IDA, x64dbg, Wireshark, INetSim, PeStudio, and FLOSS. This session offers hands-on guided experience, perfect for both beginners and advanced cybersecurity enthusiasts. Get ready to sharpen your reverse engineering skills.
5 RSVP'd
Explore the power of malware analysis with Dexter a versatile cybersecurity professional who thrives in the dynamic world of offensive and defensive operations. in the purple team, he bridge the gap between offense and defense, improving detection and response capabilities. His expertise extends to reverse engineering and malware analysis, dissecting malicious code to understand its functionality and develop countermeasures.
Learn practical techniques for dissecting malicious code through static and dynamic analysis, debugging Windows internals, and monitoring network activity. Using industry-standard tools like IDA, x64dbg, Wireshark, INetSim, PeStudio, and FLOSS, you'll uncover obfuscation techniques, analyze malware behavior, and extract Indicators of Compromise (IoCs). This session offers hands-on experience in reverse engineering, perfect for both beginners and advanced cybersecurity enthusiasts. Whether you're looking to enhance your threat-hunting skills or strengthen your defensive strategies, get ready to sharpen your investigative techniques and understand malware at a deeper level.
Thursday, March 13, 2025
12:30 PM – 2:45 PM (UTC)
GDG Lead KCA University
Women In Tech Lead
Android/Flutter Lead
IOT lead
Frontend Lead
Backend Lead
WordPress/ Bubble Developer
Cyber Security Lead
Contact Us