LIVE: How to Get Started with Malware Analysis and Reverse Engineering!

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 ก.ค. 2024
  • Learn how to get started in a career in cybersecurity - malware analysis and reverse engineering!
    🔥 FREE DOWNLOADABLE PDF - MALICIOUS DOCS QUICK REFERENCE
    quickreference.thecyberyeti.c...
    Both malware analysis and reverse engineering are exciting fields filled with challenging problems. However, knowing how to get started down these career paths can be a little confusing. In this mentoring session, I'm going to discuss how I got started and answer as many questions as I can to help those of you just beginning your journey!
    Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
    🎓 Courses on Pluralsight 👉🏻 www.pluralsight.com/authors/j...
    🌶️ TH-cam 👉🏻 Like, Comment & Subscribe!
    🙏🏻 Support my work 👉🏻 / joshstroschein
    🌎 Follow me 👉🏻 / jstrosch , / joshstroschein
    ⚙️ Tinker with me on Github 👉🏻 github.com/jstrosch
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 22

  • @Hotmustardgas20
    @Hotmustardgas20 2 ปีที่แล้ว +3

    I would love to see more Malware Analysis and RE videos! Great presentation also!

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      Absolutely, will be announcing the next live session this week! Going to look at getting started with malicious office documents :)

  • @jaygillund4732
    @jaygillund4732 2 ปีที่แล้ว +2

    This was a great video to introduce me to malware analysis. I am very thankful you recorded it, as I was unable to attend live. I look forward for your next video! Thank you sir!

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      Glad it was helpful! I'm certainly planning on more sessions in the future :)

  • @chrisbolar2880
    @chrisbolar2880 2 ปีที่แล้ว +1

    Thank you for creating regular content Dr Stroschein, I appreciate the depth and quality. I'd love to pay your team a visit once I've finished my degrees with SANS Institute.

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      Thank you for the feedback! I'm a one man band for now... but happy to chat any time :)

  • @ReleaseTheKraken25
    @ReleaseTheKraken25 6 หลายเดือนก่อน +1

    Super helpful, very much appreciated. Thanks for taking the time to put this together.

    • @jstrosch
      @jstrosch  6 หลายเดือนก่อน

      Glad it was helpful and thank you for letting me know!

  • @fatihakbas8529
    @fatihakbas8529 5 หลายเดือนก่อน +1

    Thank you for your time. I enjoyed this content! I am excited about learning more!

    • @jstrosch
      @jstrosch  5 หลายเดือนก่อน

      That's great to hear!

  • @christiangualteros36
    @christiangualteros36 2 ปีที่แล้ว

    Thank you. This is a amazing work and hard to find out. Thank you for share your knowledge I appreciated so much your effort

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      Really glad to hear it was helpful, thank you for the feedback!

  • @dtm7743
    @dtm7743 2 ปีที่แล้ว

    I love the amazing work u put up here

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      Really glad to hear you enjoyed it, thank you for the feedback!

  • @mahidharpamujula2738
    @mahidharpamujula2738 2 ปีที่แล้ว

    I would love to see more malware analysis especially RE I have been doing malware analysis for quite some time and just started RE

    • @jstrosch
      @jstrosch  ปีที่แล้ว

      I'll be posting a lot more videos this year - curious to hear if they are what you had in mind. Let me know!

  • @ashitdutta6514
    @ashitdutta6514 2 ปีที่แล้ว +1

    Professor, Many Many Thanks for the video. I have a quick question , how do convert a .exe file to an ole file ( for example .exe to .bin )

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      Hi! There really is no conversion there, just simply changing the file extension. You'll often see folks that work with and/or share malicious artifacts change the file extension to something that an operating system wouldn't recognize, in the case that you accidentally execute it (such as through a double-click).

  • @christiangualteros36
    @christiangualteros36 2 ปีที่แล้ว

    hello Josh. in your experience what is better Scylla o Cassandra in cybersecurity, both are important but my time is lacking and I want to harness it. Thank you again for everything you are the best master that I know

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      Hi! Scylla generally works quite well for me every time I use it and is also integrated into x32/64dbg. I'm not familiar with Cassandra though... could you provide a link? Of course, there are projects out there that go by the name Cassandra as well as Scylla that have nothing to do with malware analysis, I'm referring to the tool used for import reconstruction (often during malware unpacking) -> hxxps://github[.]com/NtQuery/Scylla

  • @decoder6878
    @decoder6878 2 ปีที่แล้ว

    Nice video.