filmov
tv
Malware Analysis -- LIVE -- [SillyPutty.exe]
Показать описание
--- -
In this video, I demonstrate the following:
- Analyzing strings in the malware to make a hypothesis of what is going on
- Using procmon after detonating the malware to discover host-based indicators and the payload being delivered
- Using Wireshark to monitor the network-based indicators the malware is calling out to
- Decrypting a Base64 payload and performing code review to discover the port it's calling out to
- and much more ...
Enjoy!!
---------------------
Let's connect:
This content is intended for educational purposes only. All demonstrations and techniques shown are designed to teach ethical hacking and improve cybersecurity. Any use of the information provided in these videos is done at your own risk and should be used responsibly. Unauthorized hacking, illegal activities, or violations of privacy are not endorsed or encouraged. Always ensure you have proper authorization before attempting any security testing or hacking.
In this video, I demonstrate the following:
- Analyzing strings in the malware to make a hypothesis of what is going on
- Using procmon after detonating the malware to discover host-based indicators and the payload being delivered
- Using Wireshark to monitor the network-based indicators the malware is calling out to
- Decrypting a Base64 payload and performing code review to discover the port it's calling out to
- and much more ...
Enjoy!!
---------------------
Let's connect:
This content is intended for educational purposes only. All demonstrations and techniques shown are designed to teach ethical hacking and improve cybersecurity. Any use of the information provided in these videos is done at your own risk and should be used responsibly. Unauthorized hacking, illegal activities, or violations of privacy are not endorsed or encouraged. Always ensure you have proper authorization before attempting any security testing or hacking.
Malware Analysis -- LIVE -- [SillyPutty.exe]
Exploring the Latest Malware Samples
Learning Malware Analysis with NoEscape Ransomware
Malware Analysis with The Cyber Yeti
Malware Analysis: Dynamic analysis Live Demo
Malware Analysis & Threat Intel: UAC Bypasses
Malware Analysis with The Cyber Yeti
Fileless Malware Analysis & PowerShell Deobfuscation
Hacker's Gave me a Game and I Found a Virus
Linux vs Windows: Malware
Where Does Malware Go On Your Computer?
Strange File in Downloads Folder? Gootloader Malware Analysis
Ryuk Ransomware: Live Demo and Analysis
LIVE: How to Get Started with Malware Analysis and Reverse Engineering!
Detect Hackers & Malware on your Computer (literally for free)
Is your PC hacked? RAM Forensics with Volatility
Setting up an UNDETECTABLE VM for Malware Analysis
Ransomware Attack Simulation
DarkGate Loader - Live Malware Analysis
ESXiArgs Ransomware Analysis with @fwosar
Analyzing malware samples with ProcMon
Learn to Analyze Malware - (The Malware Analysis Project 101)
Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra
Malware Analysis #short
Комментарии