Instant subscribe to @sonianuj. Shame about the audio issues but they're fairly brief and you don't lose too much.John, I appreciate that you just let people talk rather than constantly interrupting. Good content.
Please do a full course video on beginner to advanced penetration testing. You appear more experienced than most other youtubers I've seen. 🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏
How would you analyze spam emails to determine what the spammers are sending you? What point of receiving an email would you no longer be comfortable opening an email on a production system?
Unfortunately webcams are blocking a lot of screen during x64db steps on exporting the binary from memory. It becomes hard to follow what is being referenced in the video on arguments passed to virtualprotect
What a such a crack that guy, lot to learn out there. Malware analysis is that skill that I want to master either I used it or not in my day to day job
@@sonianuj yes I enjoyed the course a lot, last year january 2023 in Amsterdam with Michael Murr. The way that this course is thought through is especially good (didactic) perspective. Not touching very specific topics like steganography only, but from all the way of identifying certain API's, to understanding both assembly as pseudo C. I have recently rewrote that decryption routine based on assembly and Pseudo C to Python.
If you have the opportunity, you should consider taking the SANS courses he authored. This quality he is given, is what you will get in a 5 day long lecture.
@@xCheddarB0b42x please note there is a chance to do "work-study" you will be a facilitator of SANS, which really helps them. But because you volunteer for them, the price is reduced. Please know that there is a selection, so not a guarantee. (footnote, the price is heavily reduced). I would not talk about the details, as this is not up to me. I am not working for SANS, just a guy with a very happy experience.
is it possible to emulate keygens? Can i combine the emulation of the algorithm and supply the input at the same time onto the stack where the input would live to produce keys? (crackme keygens to be specific)
John the videos when you are not shouting or cranking the microphone volume to 11, like this one are much easier to watch. Most of the videos as of late are very loud and causing frustration.
Super appreciate the constructive criticism -- so just for my own clarification and understanding, the feedback is to be quieter, less enthusiasm and not talk with my hands?
Instant subscribe to @sonianuj. Shame about the audio issues but they're fairly brief and you don't lose too much.John, I appreciate that you just let people talk rather than constantly interrupting. Good content.
Thanks for subscribing! Sorry for those audio issues on my end, my rode NTG mic doesn't seem to be performing as expected. Working on a fix!
@@sonianuj😊
I am the dude created Qiling. This is a good video! Kudos.
Thanks for watching, that means a lot to me. And, of course, thanks for creating Qiling!
I remember watching his "Malware Evasion Techniques: API Unhooking" video. Really good. A good cyber badass, definitely
Thank you so much!
Best thing about two TH-camrs getting together for a demo/interview...A/V is always on point. Great video gentlemen!
You know this guy knows his stuff when john is just silently listening just like us 🤣
Link to his TH-cam channel?
I found it searching for Anuj Soni.
@sonianuj
Please do a full course video on beginner to advanced penetration testing. You appear more experienced than most other youtubers I've seen. 🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏
This is really awesome! I didn't know we are able to run a specific function without run the whole binary. I want to learn more! Thanks!
How would you analyze spam emails to determine what the spammers are sending you? What point of receiving an email would you no longer be comfortable opening an email on a production system?
Great video! I love Anuj'sYT channel too. He has some great content.
Unfortunately webcams are blocking a lot of screen during x64db steps on exporting the binary from memory. It becomes hard to follow what is being referenced in the video on arguments passed to virtualprotect
Wonderful resource and guest!
wow john great watch the classic so happy to see someone wearing it in 2024 got mine in 2008 or before.
I like Anuj. Awesome videos on his channel and clarity in explanation.
Thank you so much!
@@sonianuj I'd be happy to learn if you decide to make a paid course
get yourself someone who smiles like john at anuj
This is awesome John, anyway to make the camera windows smaller?
What a such a crack that guy, lot to learn out there. Malware analysis is that skill that I want to master either I used it or not in my day to day job
Such an amazing video!
Anuj Soni, this guy is truly amazing. He wrote the SANS FOR710 course, really liked doing that one
Thank you, so kind of you to say. Very happy to hear you enjoyed 710!
@@sonianuj yes I enjoyed the course a lot, last year january 2023 in Amsterdam with Michael Murr. The way that this course is thought through is especially good (didactic) perspective. Not touching very specific topics like steganography only, but from all the way of identifying certain API's, to understanding both assembly as pseudo C. I have recently rewrote that decryption routine based on assembly and Pseudo C to Python.
Great as always sir.
This detailed de-obfuscation video is incredible. What's more incredible is that I mostly followed along! 😅
If you have the opportunity, you should consider taking the SANS courses he authored. This quality he is given, is what you will get in a 5 day long lecture.
@@boogieman97 Even in my current role, I can't afford it, but I have my eye on them for sure. Thanks for the heads up!
@@xCheddarB0b42x please note there is a chance to do "work-study" you will be a facilitator of SANS, which really helps them. But because you volunteer for them, the price is reduced. Please know that there is a selection, so not a guarantee. (footnote, the price is heavily reduced). I would not talk about the details, as this is not up to me. I am not working for SANS, just a guy with a very happy experience.
@@boogieman97 I did not know that. Thank you!
Proving that a monster can be powerful, even without a head! neat!
is it possible to emulate keygens? Can i combine the emulation of the algorithm and supply the input at the same time onto the stack where the input would live to produce keys? (crackme keygens to be specific)
Great video
thank you💸💸💸
this video have audio issue
is there anyway we can get a link ti that vm he is using?
As a FOR610 alum, love this content and of course Anujs channel!
John the videos when you are not shouting or cranking the microphone volume to 11, like this one are much easier to watch. Most of the videos as of late are very loud and causing frustration.
Super appreciate the constructive criticism -- so just for my own clarification and understanding, the feedback is to be quieter, less enthusiasm and not talk with my hands?
You shouldn't have your volume up so loud.
Could you do this with rust binaries? I heard Rust compiles to some hard to analyze form.
Good question! Honestly haven't tried...
hey john make video on gui version of radare2 ( iaito ) amazing framewok and it similar to cutter as well.
nice video 👍
The Voices are a little bit not Going Normally the voices are stopping at some points
Good!!!
Did I just get mogged
Exploit development for windows plz ❤
lol
@@Alfred-Neuman what ?
@@hackwithprogramming7849
😂
really cool video..informative
VSCode for malware analysis pro🙏
1 milion
huh?
🎉
awesome thanks for the video and isntant subscribe to him too
😎