Malware Analysis & Threat Intel: UAC Bypasses

preview_player
Показать описание


🔥YOUTUBE ALGORITHM ➡ Like, Comment, & Subscribe!
Рекомендации по теме
Комментарии
Автор

dude you move through this file like butter

SERGEX
Автор

Thanks for the video. Is the anyrun segment part of a sponsored deal? If not, I would have preferred you continued to demonstrate how to deconstruct the malware locally. There's a lot of educational value and wisdom potential being lost by moving things to an online platform that requires a subscription vs local

markcentral
Автор

I love your videos, as a foreigner and because I don't speak native English, I feel very comfortable and can understand everything because of the calm and concise way you speak. In addition to practicing my English, I learn a lot about cyber security

gabriell
Автор

Treat at the end~ love John's laugh😅❤

valk
Автор

Nice start, but next time if you want to promote a tool, just go to the point and state it in the Title. Tx.

Carambolero
Автор

i know nothing about computers, but i watch your videos to feel something

J-ihso
Автор

hey fan from Morocco, all the love !!

PMM
Автор

You're take on the Apex stuff was AWESOME, thanks John!

antifreeze
Автор

I didn't know about that UAC bypass

cypher
Автор

Love the threat analysis using the dynamic analysis. Again, thanks john for another fun schooling video

Adkali
Автор

Very insightful. Thank you for doing this video.

Supstone
Автор

I'd really like to see your homelab setup and see how you run things and do your investigations and with what tools and stuff.

DuyP
Автор

I kind of like the sublime approach to clean the sample up but I also would be interested into automating stuff like this (guess R.E.M has tools for this). For example, deleting variables that are assigned but never used should be a pretty easy task.

YuKonSama
Автор

Hello Mr Hammond it is possible to defend against these type of attacks? Sorry for my english

eikichi
Автор

Never thought Id see Bonzi Buddy again.. XD

ShayBlez
Автор

why vbs is required to deploy remcos and not deploying remcos directly?

JohnSmith-jcdk
Автор

What was the intended use of this .ini file and the class named by the guid?

capability-snob
Автор

First one now i have millions in my account

learnsomething
Автор

Pro tip- change the speed to slower if you cant keep up with the commands fully, yet, like me.

codytrout
Автор

I hope you discuss Qlin Ransomware, and how to overcome it (recovery)

allofabout