This is How You Hunt For Malware
ฝัง
- เผยแพร่เมื่อ 28 ก.ค. 2024
- 📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training
💵 Support the Channel:
You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more!
☕️ Buy Me Coffee:
www.buymeacoffee.com/nahamsec
JOIN DISCORD:
discordapp.com/invite/ucCz7uh
🆓 🆓 🆓 $200 DigitalOcean Credit:
m.do.co/c/3236319b9d0b
💬 Social Media
- / nahamsec
- / nahamsec
- twitch.com/nahamsec
- / nahamsec1
Timestamps
-------
00:00 Introduction
00:02 Learning the basics of malware analysis and hunting.
01:56 Malware can be delivered through various methods.
05:48 Exploring the dark web for potential malware sources.
07:48 Exploring different types of malware on the dark web
11:58 Tracking malware creators through signatures
13:53 Exploring malware samples using virtual machines and different operating systems.
18:00 Identifying and tracking malware through indicators of compromise
19:56 Identifying and reporting vulnerable system to Steam
23:42 Analysis of malware distribution source
25:38 Identifying infected files communicating with specific domains
29:24 Accessing and analyzing malware samples using online resources
31:29 Use tools like WireShark and Joe Sandbox for malware analysis.
35:00 Examining malware's activities and potential impact
36:52 Investigating if a program is potentially a cleaner or malware.
40:30 Analyzing network traffic and identifying potential security threats.
42:22 Understanding the safe sandbox for malware hunting
Thanks for breaking into my house Ben! We got the smashed window fixed, but will take a bit more time to repair the wall you drove your car through (you know you didn't need to do both, right??)
tq bro
I had to make sure I made a grand entrance!
Where does one acquire the honks shirt?
lol
Please guys if you don't mind we need more videos like these as a beginner I would like to see someone asks my questions to a professional so I can enhance my skills. It will be an informative series and fun to watch, wish you the best
Just got to the malware stuff. your videos are GOLD!
OMG, I adore this video, and the collaboration is indescribable-truly fabulous. This will be fun & informative video to watch; from KSA all love to you guys ^_^
Great stuff. Two of my favorite content creators
HELL YES Y’ALL!! Ben and John, thank you so much for doing this and going over some tools that are absolutely useful for reversing and analysis work but also accessible for general use to help people stay safer. Very well done and easy to follow, once again - THANK YOU! 💜
Thanks for watching!
Please NahamSec make the series, this would be amazing!!!!
This feels really really great, I mean I learnt a whole lot. I feel this shouldn't end 😢. Thank you for this quality teachings. I can't wait to see more of this great content. Big thank you Nahamsec x John Hammond. 🤗❤
Great collab. Great content as usual. We want more collabe like this. It makes the format more dynamic and entertaining.
Exactly
just got my first valid report at one of intigriti's VDP program thanks for the content
Nice collab, I love the content of both, greetings
Super excited about this as I am currently diving into reverse engineering and malware analysis!!!
Yes please make a series like this
Great collab.
awesome video, We want more videos about this pls
aAmazing video, they say now with chat cpt it's much harder to find malicious emails and websites because the people who had trouble writing and spelling English words are now using Ai to structure and write their emails instead of the old ones with misspelled words. SMH
00:02 Learning the basics of malware analysis and hunting.
01:56 Malware can be delivered through various methods.
05:48 Exploring the dark web for potential malware sources.
07:48 Exploring different types of malware on the dark web
11:58 Tracking malware creators through signatures
13:53 Exploring malware samples using virtual machines and different operating systems.
18:00 Identifying and tracking malware through indicators of compromise
19:56 Identifying and reporting vulnerable system to Steam
23:42 Analysis of malware distribution source
25:38 Identifying infected files communicating with specific domains
29:24 Accessing and analyzing malware samples using online resources
31:29 Use tools like WireShark and Joe Sandbox for malware analysis.
35:00 Examining malware's activities and potential impact
36:52 Investigating if a program is potentially a cleaner or malware.
40:30 Analyzing network traffic and identifying potential security threats.
42:22 Understanding the safe sandbox for malware hunting
Thank you!!
Next Level ❤
Great Content ...
More!!
Let's goooo 🎉🎉🎉🎉
Bro, I'm going to give you some friendly constructive criticism, right off the bat! I have that same SM7b, and having correct microphone placement, in front of your mouth helps a ton!! Thanks for all that you do!
Noted! This wasn't my set up and we were working with some what of a mobile gear, but with that said, will continue to work on improving audio!
Thanks for this video, God help us
damn my youtubeverse is starting to become a reality, do david bombal next please
Thanks NahamSec & John Hammond for taking us a new gadget to learn.
Ben hopefully there will be a collab of you trying to teach John some web vulns
Mine third then 😂
got the mask finally
Awww fuck yeah, im gonna watch this later.
You guys seem to really hit it off - maybe start a regular livestream together
gold
2 of my most favorite hackers togerther, is it Christmas?
Commented when the video just started, at 1:15 I literally just jumped out of the chair in excitement, you guys are awesome
First comment