The only thing I understood was that I have a lot more to learn and also that this is gold tier content and I must level up and come back when I can understand the verbiage and processes being discussed.
It is truly confusing. At first. But it gets easier. I was taught C# from a cheat seller for video games, though not good considering he made his cheats in C++, trust me, it is not as confusing as it looks. It is imposing in sight, but in rules, it is not. It takes time.
I only knew DISASM via ASM for disassembling games to create things like nospread/noecoil and ect but more so bypassing anti-cheat systems. This is more interesting, honestly. inb4 the comedic genius of Mad Hat. Anyone in the comment section who used ASM or reverse engineering knows the video looks familiar around 3:46 @mad hat what is the best cyber security aspect that reduces the need for coding? I am not a coder, do not want to be, so is this avoidable in CS? Thanks. I used to use hex editors to check for API calls/hooks like WSOCK32 and keylogging functions before running a file. Can confirm. Packers changed this, but are reversible sometimes. To be honest this too much for me, I reside in networking, not all this code stuff. But I love your videos anyways.
Oh man I cant have enough of your videos!!!! absolutely the best. I wish Life had a FUN mod like with Your videos@@!! Connecting it Russia would be HYPE as hell hahahhaha
Did your compiler output a pdb? I recommend deleting or renaming the pdb, in the future, as Ghidra will check the pdb path that is in the PE, and automatically apply it when you analyze. Of course, you won't have a pdb when analyzing malware in the wild.
Oh yea, I think it also checks the folder the exe is in. And maybe some others. So many times I tried to analyize without pdb symbols, and they accidentally showed up. Lol.
I'm starting my college studies in the field in January, your videos are about to be my moral support
12:08 bro jacked 💪🏾
One of my favorite topic when it comes to cyber sec. Thanks for all the info and keep up the good work! Can't wait for part 2 :D
I was just thinking this would be badass to watch someone do this lets gooooooo
Thanks for uploading more advanced content!
The only thing I understood was that I have a lot more to learn and also that this is gold tier content and I must level up and come back when I can understand the verbiage and processes being discussed.
It is truly confusing. At first. But it gets easier. I was taught C# from a cheat seller for video games, though not good considering he made his cheats in C++, trust me, it is not as confusing as it looks. It is imposing in sight, but in rules, it is not. It takes time.
Awesome video! 8:00 - what is the link to find the commonly used windows API by malwares?
Great video and stellar outro. I need to go back and watch the basic video again.
Boy is cookin up some sauce for us with these vids
oh shit mad hat is doin some crazy stuff, idk what is going on but I do know my brain likes it
Mad Hat you are so epic!
Love that little gold chain haha
I only knew DISASM via ASM for disassembling games to create things like nospread/noecoil and ect but more so bypassing anti-cheat systems. This is more interesting, honestly. inb4 the comedic genius of Mad Hat. Anyone in the comment section who used ASM or reverse engineering knows the video looks familiar around 3:46
@mad hat
what is the best cyber security aspect that reduces the need for coding? I am not a coder, do not want to be, so is this avoidable in CS? Thanks.
I used to use hex editors to check for API calls/hooks like WSOCK32 and keylogging functions before running a file. Can confirm. Packers changed this, but are reversible sometimes.
To be honest this too much for me, I reside in networking, not all this code stuff. But I love your videos anyways.
Apparently, I'm having imposter syndrome .
Oh yes
Oh man I cant have enough of your videos!!!! absolutely the best. I wish Life had a FUN mod like with Your videos@@!!
Connecting it Russia would be HYPE as hell hahahhaha
I am L1 Security Analyst. Which Course would you recommend me for the future?
I got it right!!!!🎉
When pt2 mate can't wait!!
first thing i did was fire up ida pro and not cheap ASS ghidra💀 still very informative and great video❤
Did your compiler output a pdb? I recommend deleting or renaming the pdb, in the future, as Ghidra will check the pdb path that is in the PE, and automatically apply it when you analyze.
Of course, you won't have a pdb when analyzing malware in the wild.
Well, very likely you won't. Accidents probably happen. There are some dumb malware devs.
Oh yea, I think it also checks the folder the exe is in. And maybe some others. So many times I tried to analyize without pdb symbols, and they accidentally showed up. Lol.
Awesome so cool liked and subscribed
Yes I like dragon energy drink!!
Will a security clearance benefit me if working in the private sector and not government contracted?
Probably not, since the whole purpose of the security clearance is for compliance purposes - as in who's allowed to work with the data/access.
This guy is gonna be big.
Thanks man
Awesomeeeee!!!
whats your niche boss?
Blue teaming atm, IR and a good bit of threat detection.
crawl
walk
run
sprint
fly
go to space (you are here)
Nice moustache
@@duskb1t thank you friendo
Fake name, real 'stache.
cooler than I thought
Dawg for the love of god enable Dark Mode lmao
I know it is going to be a nice vid. By the way, im gonna hack you, bro
C2 framework good joke hehe
.0.