Malware Analysis Bootcamp - File Type Identification
ฝัง
- เผยแพร่เมื่อ 11 ส.ค. 2019
- Welcome to the Malware Analysis Bootcamp. We will be covering everything you need to know to get started in Malware Analysis professionally. In this video, we will be taking a look at file type identification, why it is important and the tools we will be using.
Link to slides: docs.google.com/presentation/...
Malware Sample: s3.eu-central-1.amazonaws.com...
Tools & links used in the video:
Windows VM's: developer.microsoft.com/en-us...
Fireye installation guide: www.fireeye.com/blog/threat-r...
Github Repository: github.com/fireeye/flare-vm
◼️Get Our Courses:
Python For Ethical Hacking: www.udemy.com/python-for-ethi...
Ethical Hacking Bootcamp: www.udemy.com/the-complete-et...
◼️Our Platforms:
Blog: hsploit.com/
HackerSploit Forum: hackersploit.org/
HackerSploit Cybersecurity Services: hackersploit.io
HackerSploit Academy: www.hackersploit.academy
HackerSploit Discord: / discord
HackerSploit Podcast: / hackersploit
iTunes: itunes.apple.com/us/podcast/t...
◼️Support us by using the following links:
NordVPN: nordvpn.org/hacker
Patreon: / hackersploit
I hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to post them in the comments section or on my social networks.
Social Networks - Connect With Us!
-------------------------------
Facebook: / hackersploit
Twitter: / hackersploit
Instagram: / hackersploit
Patreon: / hackersploit
--------------------------------
Thanks for watching!
Благодаря за гледането
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#MalwareAnalysis - วิทยาศาสตร์และเทคโนโลยี
You are the David Attenborough of Cybersecurity! Can’t get enough! Thank you so much for what you do for the community!
That is greatly appreciated, I am glad you find value in the content.
Amazing series! You have a great way of explaining this stuff.
Thanks You saved me a lot of time and drew me out of confusion of what to learn
Loved it. :).. looking forward to get more in this series.
Watched it over minutely... thanks for this. :)
You sir are a genius. Huge respect.
Great video. Thank you as always.
This is the ratest video about Malware Analysis in TH-cam
Thanks waiting for this :)
Splendid video
great video
Thank you.
thanks
Can you please explain what is the entry point and what are its uses?
Hello Hackersploit!!! You think I should refer to the book Malware Analysis by Monappa KA?
Which one did you refer?
"this program cannot be run in DOS"
this is located inside DOS stub
if you are running on DOS this header is identified and gets executed
else its skips this header
last 16 bits in MZ header tells the address to the PE header
(because DOS header gets skipped in windows 10)
my old memories with malware analysis
Yes, we have not yet covered headers yet. This will also be explained.
@@HackerSploit ok bro
i m just saying what i remembered
its been long while i have learnt
waiting for whole tuts
Hi, if the cff explorer can find all the info about the file type, then what is the need for all other tools explained in the video(Hexeditor,exeinfo PE)
I'm trying to download the Pestudio manually, but when i run it, it says "The version of this file is not compatible with the version of Windows you're running. Check your computer's system information to see whether you need an x86 (32-bit) or x64 (64-bit) version of the program, and then contact the software publisher."
I tried to find another version to download but I have no success. What can i do? There's another program which could replace the PEstudio?
doesn't host-only adapter allow guest to communicate with host? How is this safe?
❤❤👍👍
link for sample does not work for me
then how to find file type for packed ones
Can malware activate without execute them ?
What does MZ stand for?
😍😍😍😍😍😍
what about Hebrew in the thanks part
Cannot Download the sample, it gives me a 404 error page.
Is it cryptography?
The sample malware not PE right ?
why it doesn't work for me?
it keeps telling me that it cant open the file because if may contain viruses.
when ever i drag the malware to the hex editor or any other program.
please help x(
note that it was working before, and all of sudden it didn't work again x( x(
@Nathan Jenkins i did.. but still the malware didn't open.
However, i used linux. And it's working :p
@@theunforgiven2601 also dont run it on your main system. Use virtual box/vmware or another isolated system.
@@qwerty.760 Yep... thank you for the advice. i used VM for that :)
@@theunforgiven2601 even better, a sandbox environement.
where can i go to find malware? i just want the source code of viruses. Where can i find them?
Have you found them? I think GitHub has it
The malware sample is no longer located in the Google drive. Error 404
The issue should be resolved.
Windows Vista? Lol