Obfuscation Techniques For AntiVirus Evasion | TryHackMe Obfuscation Principles

preview_player
Показать описание
In this video walk-through, we covered the first part of obfuscation techniques and principles for signature and AV evasion where we focused on object concatenation.
**********
Receive Cyber Security Field Notes and Special Training Videos
Writeup
*******
Layered Obfuscation Taxonomy | Research Paper
*************
Store
Patreon
LinkedIn
Instagram
Google Profile
Twitter
Facebook
******
0:00 - Introduction to Obfuscation Techniques
0:12 - Overview of Obfuscation Principles and Signature Evasion
0:40 - Steps to Start Learning Obfuscation
1:00 - Definition of Obfuscation
1:11 - Recommended Reading for Obfuscation
1:42 - Key Concepts of Obfuscation
2:12 - Obfuscation Process Explained
3:00 - Goals of Obfuscation: Protecting Intellectual Property
4:03 - Obfuscation in Software Development
5:00 - Role of Obfuscation in Signature Evasion
6:01 - Taxonomy of Obfuscation Techniques
7:01 - Focus on Code Element Layer
7:40 - Methods for Data Obfuscation
8:20 - Techniques: Array Transformation, Data Encoding, and More
10:05 - Concatenation Example in Programming
12:11 - Concatenation in Different Programming Languages
13:11 - Practical Example: Powershell Code Obfuscation
14:10 - Identifying Problematic Code for Antivirus Detection
15:14 - Applying Concatenation for Obfuscation
16:35 - Testing the Obfuscated Code
17:02 - Exploring Additional Obfuscation Techniques
Рекомендации по теме
Комментарии
Автор

Amazing explanation 💯💯
Thank you sir!!!

MellamoMaria
Автор

My town was two small to really quarantine we only had like 25 infectious people.

uamhenry
Автор

very informative
sir from where to start in this field?

omarsalam
Автор

اخي ارجوووك تعمل فيديو ل gsa اعدادات الضبط الخ لكل حاجه في إضافة صور كل شي منفضلك انتظر هذا الفيديو وشرح عربي منفضلك

midosdeekcoder
Автор

Hi is there any way to hack whatsapp chat of a user

therazgriz
join shbcf.ru