filmov
tv
Obfuscation Techniques For AntiVirus Evasion | TryHackMe Obfuscation Principles

Показать описание
In this video walk-through, we covered the first part of obfuscation techniques and principles for signature and AV evasion where we focused on object concatenation.
**********
Receive Cyber Security Field Notes and Special Training Videos
Writeup
*******
Layered Obfuscation Taxonomy | Research Paper
*************
Store
Patreon
LinkedIn
Instagram
Google Profile
Twitter
Facebook
******
0:00 - Introduction to Obfuscation Techniques
0:12 - Overview of Obfuscation Principles and Signature Evasion
0:40 - Steps to Start Learning Obfuscation
1:00 - Definition of Obfuscation
1:11 - Recommended Reading for Obfuscation
1:42 - Key Concepts of Obfuscation
2:12 - Obfuscation Process Explained
3:00 - Goals of Obfuscation: Protecting Intellectual Property
4:03 - Obfuscation in Software Development
5:00 - Role of Obfuscation in Signature Evasion
6:01 - Taxonomy of Obfuscation Techniques
7:01 - Focus on Code Element Layer
7:40 - Methods for Data Obfuscation
8:20 - Techniques: Array Transformation, Data Encoding, and More
10:05 - Concatenation Example in Programming
12:11 - Concatenation in Different Programming Languages
13:11 - Practical Example: Powershell Code Obfuscation
14:10 - Identifying Problematic Code for Antivirus Detection
15:14 - Applying Concatenation for Obfuscation
16:35 - Testing the Obfuscated Code
17:02 - Exploring Additional Obfuscation Techniques
**********
Receive Cyber Security Field Notes and Special Training Videos
Writeup
*******
Layered Obfuscation Taxonomy | Research Paper
*************
Store
Patreon
Google Profile
******
0:00 - Introduction to Obfuscation Techniques
0:12 - Overview of Obfuscation Principles and Signature Evasion
0:40 - Steps to Start Learning Obfuscation
1:00 - Definition of Obfuscation
1:11 - Recommended Reading for Obfuscation
1:42 - Key Concepts of Obfuscation
2:12 - Obfuscation Process Explained
3:00 - Goals of Obfuscation: Protecting Intellectual Property
4:03 - Obfuscation in Software Development
5:00 - Role of Obfuscation in Signature Evasion
6:01 - Taxonomy of Obfuscation Techniques
7:01 - Focus on Code Element Layer
7:40 - Methods for Data Obfuscation
8:20 - Techniques: Array Transformation, Data Encoding, and More
10:05 - Concatenation Example in Programming
12:11 - Concatenation in Different Programming Languages
13:11 - Practical Example: Powershell Code Obfuscation
14:10 - Identifying Problematic Code for Antivirus Detection
15:14 - Applying Concatenation for Obfuscation
16:35 - Testing the Obfuscated Code
17:02 - Exploring Additional Obfuscation Techniques
Комментарии