Malware Demo and Tutorial

preview_player
Показать описание

// Links to Synthetic Sample //
Note that this sample contains evasion techniques from used by real world Malware without a Harmful Payload, so you can use this sample to follow along:

// Kyle's Social //

// Evasive Malware Book //
Evasive Malware by Kyle Cucci:

// YouTube video REFERENCE //

// David's SOCIAL //

// MY STUFF //

// SPONSORS //

// MENU //
00:00 - Coming Up
00:53 - Brilliant Advert
02:18 - Intro
02:47 - Disclaimer
03:12 - Demo Overview
04:46 - Demonstration Begins
11:20 - Registry Editor
14:01 - Malware Checking
16:50 - x64dbg
21:10 - Language Codes
23:18 - Why Malware Checks Languages
25:42 - Origins of the Demo
28:33 - Malware Output
36:20 - Internet Connection
36:44 - Remnux
41:01 - Flare VM
43:00 - Evasive Malware Synopsis
45:48 - Virtualbox or VmWare
47:21 - Stack & Heap Definitions
48:21 - Evasive Malware Operating Systems
49:02 - Virtual Machine VS Sandbox
55:44 - Conclusion

windows
windows 11
windows 10
microsoft
apple
ios
iphone
android
samsung
exploit
malware
malware evasion
how to write malware
virtualbox
virtual box
vmware
exploit development
linux
kali linux
virus
trojan
trojan virus
spyware
ransomware
worm

Disclaimer: This video is for educational purposes only.

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#windows #malware #hacker
Рекомендации по теме
Комментарии
Автор


// Links to Synthetic Sample //
Note that this sample contains evasion techniques from used by real world Malware without a Harmful Payload, so you can use this sample to follow along:


// Kyle's Social //

// Evasive Malware Book //
Evasive Malware by Kyle Cucci:

// YouTube video REFERENCE //


// David's SOCIAL //

// MY STUFF //

// SPONSORS //

// MENU //
00:00 - Coming Up
00:53 - Brilliant Advert
02:18 - Intro
02:47 - Disclaimer
03:12 - Demo Overview
04:46 - Demonstration Begins
11:20 - Registry Editor
14:01 - Malware Checking
16:50 - x64dbg
21:10 - Language Codes
23:18 - Why Malware Checks Languages
25:42 - Origins of the Demo
28:33 - Malware Output
36:20 - Internet Connection
36:44 - Remnux
41:01 - Flare VM
43:00 - Evasive Malware Synopsis
45:48 - Virtualbox or VmWare
47:21 - Stack & Heap Definitions
48:21 - Evasive Malware Operating Systems
49:02 - Virtual Machine VS Sandbox
55:44 - Conclusion

windows
windows 11
windows 10
microsoft
apple
ios
iphone
android
samsung
exploit
malware
malware evasion
how to write malware
virtualbox
virtual box
vmware
exploit development
linux
kali linux
virus
trojan
trojan virus
spyware
ransomware
worm

Disclaimer: This video is for educational purposes only.

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#windows #malware #hacker

davidbombal
Автор

Great work as always David! Love the malware example. You know I wanna see that thing at the packet level 🦈

ChrisGreer
Автор

I took a class on malware analysis and it was all in assembly my head is still smoking from that course.

SavageScientist
Автор

It´s allways a bit frightening when you´ve a vague idea about a topic and learn how there´re entire branches you had no idea they´d even existed. Thanx for the insights.

Randy
Автор

This tutorial was incredibly well-executed!

LarryPike-lc
Автор

Thanks For This Video I was Looking for how to affect someone with malware before 2 day Now You Are Here

abhijeetultimate
Автор

Very cool. Love seeing how the malware actually works.

Agent_Orange_Peel
Автор

Great video just watched the entire thing and man super pumped now.

I’d love to see a video on email phishing/Malware analysis.

dth
Автор

Awesome demo! It's definitely worth waiting for more!

stanlee
Автор

This tutorial was incredibly valuable!

SylvesterHolland-zx
Автор

This was a great intro to malware analysis. Would appreciate more content like this.

Also if I understood this right, as a regular user you could install some of this tools and VMs to trick the malware to not run on your personal PC because it thinks it might be in a sandbox?

LaughingMan
Автор

Your explanations are clear and easy to follow!

OssieNewlon-sd
Автор

Very well done! Your guest was fantastic and explained AND showed what to do in a way that was easy to follow along with! Best channel in cybersecurity -OTW

Kimberleeannreynolds
Автор

Thanks a lot for making this video. It's a great boost for malware analyst like me.

human-being
Автор

Every day there are more and more meaningful lessons😏🙂‍↔️🙂‍↕️😌☺️😍

Victor_ivic
Автор

2 Cool Guys In the same place .thank you Mr.David

cyberyaku
Автор

This looks fun :) thank you for the share. Haven't heard of this book yet.

mitospha
Автор

an analysis of 'polymorphic' malware that mutates would be cool

davesabra
Автор

Thank you, Sir David and Kyle🙏 it's another great content 👏 David could you please make a video about social engineering in hacking and cybersecurity. All the best for everyone

anvayashakti
Автор

wow ... I need to watch more video like this. david

oneloveafrica