Malware Analysis Bootcamp - Packers & Unpacking
ฝัง
- เผยแพร่เมื่อ 1 ต.ค. 2024
- Welcome to the Malware Analysis Bootcamp. We will be covering everything you need to know to get started in Malware Analysis professionally. In this video, we will be taking a look at malware packing, how to detect packing, and how to unpack it with various tools.
Link to slides: drive.google.c...
Malware Sample: s3.eu-central-...
Tools & links used in the video:
Windows VM's: developer.micr...
Fireye installation guide: www.fireeye.co...
Github Repository: github.com/fir...
◼️Get Our Courses:
Python For Ethical Hacking: www.udemy.com/...
Ethical Hacking Bootcamp: www.udemy.com/...
◼️Our Platforms:
Blog: hsploit.com/
HackerSploit Forum: hackersploit.org/
HackerSploit Cybersecurity Services: hackersploit.io
HackerSploit Academy: www.hackersplo...
HackerSploit Discord: / discord
HackerSploit Podcast: / hackersploit
iTunes: itunes.apple.c...
◼️Support us by using the following links:
NordVPN: nordvpn.org/ha...
Patreon: / hackersploit
I hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to post them in the comments section or on my social networks.
Social Networks - Connect With Us!
-------------------------------
Facebook: / hackersploit
Twitter: / hackersploit
Instagram: / hackersploit
Patreon: / hackersploit
--------------------------------
Thanks for watching!
Благодаря за гледането
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#MalwareAnalysis
I don’t usually comment on videos, but man your channel is a gold mine of knowledge. Thank you for making such amazing videos.
At 6:13; why did you use -q & -v together? According to the help you're telling `upk` to be quiet & be verbose at the same time. That doesn't make sense to me, so what am I missing?
Still, no advice on getting the shell context menus -> right-click - strings - that others have commented on. Would have been nice to include the "packed" version in the sample download. Frustrating stuff in the last few videos.
hi bro, can u upload the video to bilibili.com, Some Chinese viewers are looking forward to your excellent video. respect
Please tell me how to install Strings GUI as you used in the video?? Thank you!
Did you ever figure this out, seems the author doesn't like this question.
@@jamespatrick8145 Just use pestudio
hello sir how to make internet connection to virtual box...? my virtual box showing unidentified network
you go to the parametre of virtualbox and you try to change Network/Adapter1 to "Bridged Adapter" for being on the same network as your reel OS
Thankyou for your efforts! Truly appreciated!
Great knowledge sir plz tell you belong to which country
thanks a lot !!!! when will be next videos ?
Could you help me to get job as a malware analyst
i just wanted to know that, is this course enough? i mean will i become a professional malware analyst by taking this course or should i grab some more books?
Sir, Your videso are real Gem, but I think the sample you have provided in this video is already unpacked
Thanks
I have a question on metasploit.
I dont get it when you want to attack someone how do you specify who you attack in your video you just took the ip from virtual machine what if i want to attack a neighbour?
I love this, I started with your pen testing videos but I always wanted to learn how vicious a binary can be and wanted to diasect and learn piece by piece. I love your chanel.
Please make a video on python for hacking Android Trojan (over the network)
if the attacker written own packer. Usually how we unpack the malware?
@HackerSploit can you make more video of blackarch linux?
Very well explained and crystal clear..good work👏👍
You sound like Mufti Menk
Honest teacher
next video he's gonna do this on linux :)
Hey 7th
3rd
First :)
Amazing sir
1st😁❤️
Really appreciate the bootcamp
Can you do a video on Mirai botnets: their use and how to protect