Malware Theory - Memory Mapping of PE Files - - vimore.org

Malware Theory - Memory Mapping of PE Files

Malware Theory - Memory Mapping of PE Files

YouTube

How are PE files mapped into memory? Follow me on Twitter: https://twitter.com/struppigel



Malware Theory - Basic Structure of PE Files

I explain the basic structure of the Portable Executable file format using animated graphics. This video is meant for beginners in malware analysis. Follow me

YouTube

AirBnBeware: Short Term Rentals Long Term Pwnage

by Jeremy Galloway What's scarier, letting HD Moore rent your house and use your home network for day or being the very next renter that uses that network? Wit

YouTube

Hacking Websites with SQL Injection - Computerphile

Websites can still be hacked using SQL injection - Tom explains how sites written in PHP (and other languages too) can be vulnerable and have basic security iss

YouTube

File Systems as Fast As Possible

NTFS, FAT32, exFAT...what are the differences between file systems, and what does a file system actually do, anyway? lynda.com message: Sign up for your 10-day

YouTube

Malware Analysis - When De4dot fails, Removing Anti Tamper from NullShield

Decompilation fails and de4dot cannot deobfuscate this trojan spy named Evrial. We discover code in the module's constructor (.cctor) that fixes the assembly.

YouTube

Taking Hunting to the Next Level: Hunting in Memory - SANS Threat Hunting Summit 2017

The vast majority of threat hunting takes place on easily visible and accessible system artifacts. These include log entries, network data, command line histori

YouTube

Mapping Virtual Physical Memory - Georgia Tech - HPCA: Part 4

Watch on Udacity: https://www.udacity.com/course/viewer#!/c-ud007/l-1032798942/m-1014480747 Check out the full High Performance Computer Architecture course for

YouTube

KringleCon 2018 - Chris Davis, Analyzing PowerShell Malware

Attend Free Online Virtual Hacker Conference: www.kringlecon.com Presented by: Chris Davis Learn information security skills: www.sans.org In this talk we disc

YouTube

C Programming Tutorial 1 : Memory Layout of a C / C++ Program : Think Aloud Academy

In this video we will look at memory layout for a C / C++ program. When we run a C or C++ program, the loader module loads the executable version of the C / C++

YouTube

Malware Theory - Oligomorphic, Polymorphic and Metamorphic Viruses

Concepts and terminology of encrypted viruses and self-mutating viruses. Follow me on Twitter: https://twitter.com/struppigel

YouTube

Don't trust time

Clickbait title. Just a bit of brain food. Games, licenses and many other things depend on a good time source. But where does the time come from and should you

YouTube

CppCon 2017: James McNellis “Everything You Ever Wanted to Know about DLLs”

http://CppCon.org — Presentation Slides, PDFs, Source Code and other presenter materials are available at: https://github.com/CppCon/CppCon2017 — If you build s

YouTube

Build an Antivirus in 5 Min - Fresh Machine Learning #7

In this video, we talk about how machine learning is used to create antivirus programs! Specifically, a classifier can be trained to detect whether or not some

YouTube

ScanPOS malware delivered by Kronos Banking Trojan - Quick Code Analysis

Here I show you the disassembly of point-of-sale malware knowng as ScanPOS. According to ProofPoint this was delivered by the Kronos Banking Trojan back in 2016

YouTube

How to Map Files into Memory in C (mmap)

My recent, related videos: Basic File IO in C https://youtu.be/BQJBe4IbsvQ Get the size of files. https://youtu.be/FT2A2HQbTkU Easier working with file paths

YouTube

Malware Analysis - Process Hollowing

We unpack a Dridex sample that uses process hollowing for memory execution. Follow me on Twitter: @struppigel Sample: https://www.hybrid-analysis.com/sample/e

YouTube

Virtual Memory: 3 What is Virtual Memory?

Interactive lecture at http://test.scalable-learning.com, enrollment key YRLRX-25436. What is virtual memory? Indirection between the program's addresses and th

YouTube

Malware Analysis - Unpack and Decompile PyInstaller Malware

We unpack and decompile a malware that was written in Python and transformed into an executable with PyInstaller. In order to do that we have to fix the header

YouTube