🎥 Analyzing Portable Executable Files with PEStudio

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 ธ.ค. 2024

ความคิดเห็น •

  • @Manavetri
    @Manavetri ปีที่แล้ว +3

    One of the most professionals, clearest TH-camr I ever heard. I appreciate your commitment to share your knowledge.
    Thank you

    • @jstrosch
      @jstrosch  ปีที่แล้ว

      You are very welcome, thank you for the kind words!

  • @mmm-me4kk
    @mmm-me4kk ปีที่แล้ว +1

    Hello Josh , thank you very much. Quick question, can you consider the "functions" section as the IAT ?

    • @jstrosch
      @jstrosch  ปีที่แล้ว +1

      Yes, the functions and imports are just mapping the IAT from the file.

  • @sscoconut1265
    @sscoconut1265 ปีที่แล้ว +1

    why does my hex editor shows the offset to next section being 00 10 00 00 instead of F8 00 00 00?

    • @jstrosch
      @jstrosch  ปีที่แล้ว

      That is the offset to the image_nt_headers, it will be different between PE files. I can't say for sure why it's not consistent, but it won't be - you'll see a variety of values here. That is why that value is read than added to the beginning of the file to locate that section, instead of just locating image_nt_headers without referencing it.

  • @digitalblue8158
    @digitalblue8158 2 ปีที่แล้ว +3

    Following your tut, I'm a budding sec analyst. Some hotlinks to your resources would be helpful. Thanks for the thorough explanations

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      Really glad to hear the explanations have been helpful! I've been hesitant to drop links in the video description because I've received strikes against my account if something flags that content as malicious - which is often the case when I link to tools, etc. I'll try again and maybe even add some links that can't be parsed programmatically but visually. Feel free to DM me as well on LinkedIn or Twitter if I can help with specific questions.

  • @TRYEYTSG
    @TRYEYTSG 2 ปีที่แล้ว

    hey when iam open pestudio i can see only 3 category any idea y ?
    indicators
    virustotal
    strings
    and not match of information

    • @jstrosch
      @jstrosch  ปีที่แล้ว +1

      Usually that is due to the file you are opening not being a PE file. PEStudio will still provide limited information as you point out for non-PE files, but it is really designed for those file types. If you are unsure, you can open a terminal on a Mac or Linux and use the file utility, output along the lines of "PE32..." are the files you are after. Let me know if this helps!

  • @kumarsiddappa6118
    @kumarsiddappa6118 ปีที่แล้ว +1

    Any sample PE file to analyze

    • @jstrosch
      @jstrosch  ปีที่แล้ว

      Any PE file will suffice - that is, a file in Windows with a .exe extension. I've also added the compiled binaries to my "Learning Reverse Engineering" repository on Github - so you can download those as well.

  • @jyotigaur242
    @jyotigaur242 2 ปีที่แล้ว

    Thank you Josh for this video

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      My pleasure! Thank you for the comment :)

  • @trens
    @trens 2 ปีที่แล้ว

    Have you seen Malcat?

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      I have heard of it, but haven't had a chance to take a look. Looks really impressive from the website, will definitely check it out soon and maybe even make a video... Thanks for the tip!

  • @omarhabibi4872
    @omarhabibi4872 2 ปีที่แล้ว

    thank you so much

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว +1

      You're welcome, thank you for the comment!

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      You’re most welcome!

  • @amadoumane7600
    @amadoumane7600 ปีที่แล้ว +1

    GREAT

    • @jstrosch
      @jstrosch  ปีที่แล้ว +1

      Glad you liked it :)

  • @DEDEPLDEDE
    @DEDEPLDEDE 3 หลายเดือนก่อน

    4D 5A = executable file 😊

    • @jstrosch
      @jstrosch  2 หลายเดือนก่อน

      Well, sometimes any way :)

  • @maritoguionyo
    @maritoguionyo 2 ปีที่แล้ว

    Oi

  • @Yunsol0116
    @Yunsol0116 2 ปีที่แล้ว

    thank you so much

    • @jstrosch
      @jstrosch  2 ปีที่แล้ว

      You’re very welcome!