
or chechik
ישראל
פרילנסר
אודותינו
Malware and Security Researcher
Interests in short: Malware analysis, Reverse Engineering, Memory Forensics and Rootkit Research
My experience and work is composed by skills such as:
• Malware reversing & debugging (static & dynamic).
• Deep knowledge in Windows OS Internals.
• Research of emerging threats in the malware landscape.
• Deploying & developing a multi-platform automated forensics and malware analysis system.
• Write internal and external whitepapers, procedures and work methods.
• Incident Handling and investigation (been in incident response for a year)
• Malware Analysis
• Digital Forensics
• Reverse Engineering
• Memory analysis (Volatility ,rekall .. )
• Dynamic Analysis by using debuggers and emulators
• Static and Dynamic Analysis using IDA Pro
• Knowledge in IDA Python and IDC
• C and C++ Programming for reversing
• Windows System Programming
• Python programming
• Assembly programming (POC purposes)
• Windows Kernel
• Processor concepts
• Device Drivers concepts
• Postmortem forensics analysis (disk and network) by using filesystem analysis, Windows Registry Forensics, timelines, shadow copies, and so on.
o Anti-Forensic tricks such as:
o Malware Stealth: process injection, DLL Injection, Hook Injection, Hollowing, APC Injection, DLL Load-Order Hijacking, IAT Hooking, EAT Hooking
o Rootkits techniques such as SSDT hooking, IDT hooking, GDT hooking, Detours, DKOM, Kernel Callbacks,
o Anti-debugging techniques
o Anti-disassembly techniques
o Anti-VM techniques
o Packers
o Shellcode
Computer and Network Security
Interests in short: Malware analysis, Reverse Engineering, Memory Forensics and Rootkit Research
My experience and work is composed by skills such as:
• Malware reversing & debugging (static & dynamic).
• Deep knowledge in Windows OS Internals.
• Research of emerging threats in the malware landscape.
• Deploying & developing a multi-platform automated forensics and malware analysis system.
• Write internal and external whitepapers, procedures and work methods.
• Incident Handling and investigation (been in incident response for a year)
• Malware Analysis
• Digital Forensics
• Reverse Engineering
• Memory analysis (Volatility ,rekall .. )
• Dynamic Analysis by using debuggers and emulators
• Static and Dynamic Analysis using IDA Pro
• Knowledge in IDA Python and IDC
• C and C++ Programming for reversing
• Windows System Programming
• Python programming
• Assembly programming (POC purposes)
• Windows Kernel
• Processor concepts
• Device Drivers concepts
• Postmortem forensics analysis (disk and network) by using filesystem analysis, Windows Registry Forensics, timelines, shadow copies, and so on.
o Anti-Forensic tricks such as:
o Malware Stealth: process injection, DLL Injection, Hook Injection, Hollowing, APC Injection, DLL Load-Order Hijacking, IAT Hooking, EAT Hooking
o Rootkits techniques such as SSDT hooking, IDT hooking, GDT hooking, Detours, DKOM, Kernel Callbacks,
o Anti-debugging techniques
o Anti-disassembly techniques
o Anti-VM techniques
o Packers
o Shellcode
Computer and Network Security
תחומי התמחות
מרצים ומדריכים
מרצים, מדריכי אבטחת מידע, סייבר
טכנולוגיה
אבטחת מידע ורשתות
Cyber Security סייבר
תכנות ופיתוח תוכנה
C, C++
Scripting
Python
Device Driver Development
Assembly
חוות דעת
