Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/davidbombal // Links to Synthetic Sample // Note that this sample contains evasion techniques from used by real world Malware without a Harmful Payload, so you can use this sample to follow along: From Malshare (Anyone can download for free): malshare.com/sample.php?action=detail&hash=96e4b4290473f1e567865497168d029ce1b2fa41279fbf1e3f452002360d486a From VirusTotal (Those with paid accounts can download)www.virustotal.com/gui/file/96e4b4290473f1e567865497168d029ce1b2fa41279fbf1e3f452002360d486a // Kyle's Social // X: x.com/d4rksystem LinkedIn: www.linkedin.com/in/kylecucci Website: securityliterate.com/ GitHub: github.com/d4rksystem // Evasive Malware Book // Evasive Malware by Kyle Cucci: US: amzn.to/3Nql2G2 UK: amzn.to/3BN6pu9 // TH-cam video REFERENCE // Free Exploit development training (beginner and advanced) th-cam.com/video/LWmy3t84AIo/w-d-xo.html Buffer Overflow Hacking Tutorial (Bypass Passwords): th-cam.com/video/c2BvS2VqDWg/w-d-xo.html // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: www.x.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal TH-cam: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming Up 00:53 - Brilliant Advert 02:18 - Intro 02:47 - Disclaimer 03:12 - Demo Overview 04:46 - Demonstration Begins 11:20 - Registry Editor 14:01 - Malware Checking 16:50 - x64dbg 21:10 - Language Codes 23:18 - Why Malware Checks Languages 25:42 - Origins of the Demo 28:33 - Malware Output 36:20 - Internet Connection 36:44 - Remnux 41:01 - Flare VM 43:00 - Evasive Malware Synopsis 45:48 - Virtualbox or VmWare 47:21 - Stack & Heap Definitions 48:21 - Evasive Malware Operating Systems 49:02 - Virtual Machine VS Sandbox 55:44 - Conclusion windows windows 11 windows 10 microsoft apple ios iphone android samsung exploit malware malware evasion how to write malware virtualbox virtual box vmware exploit development linux kali linux virus trojan trojan virus spyware ransomware worm Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #windows #malware #hacker
It´s allways a bit frightening when you´ve a vague idea about a topic and learn how there´re entire branches you had no idea they´d even existed. Thanx for the insights.
Very well done! Your guest was fantastic and explained AND showed what to do in a way that was easy to follow along with! Best channel in cybersecurity -OTW
Thank you, Sir David and Kyle🙏 it's another great content 👏 David could you please make a video about social engineering in hacking and cybersecurity. All the best for everyone
This was a great intro to malware analysis. Would appreciate more content like this. Also if I understood this right, as a regular user you could install some of this tools and VMs to trick the malware to not run on your personal PC because it thinks it might be in a sandbox?
there are like tens of anti sandbox techniques to achieve that. question is how much are you interested and willing to check that yourself, because I can help a bit
Love from pakistan 🇵🇰 mr david make an video for an person who do have knowledge of cyber security but don't have much of an real practicle experience an road map video
You forgot to say the most important about malware. Strictly talking windoze itself is the worst malware so the best way to get rid of all this trash is to use Linux.
def fibonacci_iterative(n): fib = [0, 1] for i in range(2, n): fib.append(fib[i-1] + fib[i-2]) return fib # Example usage n = 99999999 # Get the first 10 Fibonacci numbers print(fibonacci_iterative(n))
Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/davidbombal
// Links to Synthetic Sample //
Note that this sample contains evasion techniques from used by real world Malware without a Harmful Payload, so you can use this sample to follow along:
From Malshare (Anyone can download for free): malshare.com/sample.php?action=detail&hash=96e4b4290473f1e567865497168d029ce1b2fa41279fbf1e3f452002360d486a
From VirusTotal (Those with paid accounts can download)www.virustotal.com/gui/file/96e4b4290473f1e567865497168d029ce1b2fa41279fbf1e3f452002360d486a
// Kyle's Social //
X: x.com/d4rksystem
LinkedIn: www.linkedin.com/in/kylecucci
Website: securityliterate.com/
GitHub: github.com/d4rksystem
// Evasive Malware Book //
Evasive Malware by Kyle Cucci:
US: amzn.to/3Nql2G2
UK: amzn.to/3BN6pu9
// TH-cam video REFERENCE //
Free Exploit development training (beginner and advanced) th-cam.com/video/LWmy3t84AIo/w-d-xo.html
Buffer Overflow Hacking Tutorial (Bypass Passwords): th-cam.com/video/c2BvS2VqDWg/w-d-xo.html
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: www.x.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
TH-cam: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming Up
00:53 - Brilliant Advert
02:18 - Intro
02:47 - Disclaimer
03:12 - Demo Overview
04:46 - Demonstration Begins
11:20 - Registry Editor
14:01 - Malware Checking
16:50 - x64dbg
21:10 - Language Codes
23:18 - Why Malware Checks Languages
25:42 - Origins of the Demo
28:33 - Malware Output
36:20 - Internet Connection
36:44 - Remnux
41:01 - Flare VM
43:00 - Evasive Malware Synopsis
45:48 - Virtualbox or VmWare
47:21 - Stack & Heap Definitions
48:21 - Evasive Malware Operating Systems
49:02 - Virtual Machine VS Sandbox
55:44 - Conclusion
windows
windows 11
windows 10
microsoft
apple
ios
iphone
android
samsung
exploit
malware
malware evasion
how to write malware
virtualbox
virtual box
vmware
exploit development
linux
kali linux
virus
trojan
trojan virus
spyware
ransomware
worm
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#windows #malware #hacker
Great work as always David! Love the malware example. You know I wanna see that thing at the packet level 🦈
Need you to come back on the channel Chris! 😀
@@davidbombal let’s do it! I’ll shoot you a text. 👍
Saved to watch later. I will return.
I hope you enjoy the video 😀
Stop procastinating, Timothy.
No you won't
Stop lying to yourself, we both know u won't
I swear 😭 I thought I was the only one who randomly have hundreds of videos I have to watch, on the later , after later
I took a class on malware analysis and it was all in assembly my head is still smoking from that course.
Thanks For This Video I was Looking for how to affect someone with malware before 2 day Now You Are Here
Thank u for the interview. An fresh look with loads of directions to tinkle in the home lab
More content is covered...
I really appreciate your hard work for providing this type of content, that is not available in paid courses too..
This is truly interesting , at first it seems so complicated but then it's like playing the cat and the mouse , I love it.
I've tried many techniques to achieve that, can't wait to see which one was used here!
It´s allways a bit frightening when you´ve a vague idea about a topic and learn how there´re entire branches you had no idea they´d even existed. Thanx for the insights.
Very cool. Love seeing how the malware actually works.
Need another brilliant video about malware analysis with Kyle.
This tutorial was incredibly well-executed!
Thanks a lot for making this video. It's a great boost for malware analyst like me.
You are welcome
Great video just watched the entire thing and man super pumped now.
I’d love to see a video on email phishing/Malware analysis.
Gonna get my degree from the university of david bombal youtube channel... Thank you David... great video
Very well done! Your guest was fantastic and explained AND showed what to do in a way that was easy to follow along with! Best channel in cybersecurity -OTW
Awesome demo! It's definitely worth waiting for more!
Glad you like it!
I would like the demonstrator to explain about Assembly langue, as it would be easier to debug and understand it's functionality.
Your explanations are clear and easy to follow!
Glad to hear that!
Thank you, Sir David and Kyle🙏 it's another great content 👏 David could you please make a video about social engineering in hacking and cybersecurity. All the best for everyone
This tutorial was incredibly valuable!
"This is not real." It is scary enough. Thanks for this video.
Every day there are more and more meaningful lessons😏🙂↔️🙂↕️😌☺️😍
This was a great intro to malware analysis. Would appreciate more content like this.
Also if I understood this right, as a regular user you could install some of this tools and VMs to trick the malware to not run on your personal PC because it thinks it might be in a sandbox?
there are like tens of anti sandbox techniques to achieve that. question is how much are you interested and willing to check that yourself, because I can help a bit
This looks fun :) thank you for the share. Haven't heard of this book yet.
2 Cool Guys In the same place .thank you Mr.David
Hi broooooo😅
Who are malware pro they are god levels in hacking field ❤❤
wow ... I need to watch more video like this. david
Sweet! Thank you for the video!
an analysis of 'polymorphic' malware that mutates would be cool
Love from pakistan 🇵🇰 mr david make an video for an person who do have knowledge of cyber security but don't have much of an real practicle experience an road map video
Thank you so much sir Sharing this video ❤
You're welcome!
Love from Sri Lanka 🇱🇰
Love to see a demo on rootkits
thank you for this video we need more video like this thank you :-)
GOOD EXPLAINATIONS!😃
Glad it was helpful!
Thanks 😊 ❤. 🎉 Do a video about rootkit and zero click attacks
Downloaded to watch later
I hope you enjoy the video 😀
@@davidbombal always, thank you 🙏
Sir, why didn't you reviewed about hand held devises like Rog ally,x,legion go,claw,may be steam(uses linux based os)
Gonna download it
Thanks!
We need a good topic about ss7 exploit which targets SIM card signal
What about running malware in Hyper V?
Ima comment, if it wasn’t for you, I wouldn’t have been able to do what I’ve done, allegedly, with that being said, thank you nsa
Seems harder than actually building exe
How to install kali linux nethunter on a rooted but unsupported phone?
Hello David, my name is V I would like to enjoy conversation with you all day
I looked up The book on Amazon in Canada, $91.50, No thanks
It was amazing!! Come back kyle, rootkit demo would be great. Thanks for the fantastic book.
You forgot to say the most important about malware. Strictly talking windoze itself is the worst malware so the best way to get rid of all this trash is to use Linux.
Now your videos are not exciting now you don't do demo videos why everyday talking
Seems like you are making comments without watching the videos. This video has a massive demo - most of the video is actually a demo.
def fibonacci_iterative(n):
fib = [0, 1]
for i in range(2, n):
fib.append(fib[i-1] + fib[i-2])
return fib
# Example usage
n = 99999999 # Get the first 10 Fibonacci numbers
print(fibonacci_iterative(n))
Collapse cpu
I hope to write some sophisticated malware one day 🫶🏻