Пікірлер
@Luuucaaaa
@Luuucaaaa Күн бұрын
Very interesting! Thanks for the insights
@KamranKhan-j9z9i
@KamranKhan-j9z9i 3 күн бұрын
please make on video how to bypass Vmprotect .exe files
@James-k2p8y
@James-k2p8y 14 күн бұрын
Amazing
@DEVStoreApp
@DEVStoreApp 16 күн бұрын
Amazing content bro 😎 we’re subscribers as of now learning a lot too by the way thx ☺️
@sonianuj
@sonianuj 13 күн бұрын
Appreciate the kind words!
@joeypatrick2585
@joeypatrick2585 18 күн бұрын
This may be the clearest and easiest to understand overview of BNinja on the planet. Total respect for your work!
@sonianuj
@sonianuj 13 күн бұрын
Thank you so much!
@infinit3i
@infinit3i 19 күн бұрын
i needed this
@sonianuj
@sonianuj 19 күн бұрын
So happy to hear it was helpful!
@VoiceOfASikh
@VoiceOfASikh Ай бұрын
Excellent guidance! Thanks for sharing this informative video.
@sonianuj
@sonianuj 29 күн бұрын
Thanks for watching! Glad to hear you enjoyed it!
@dimajaykobson7506
@dimajaykobson7506 Ай бұрын
Awesome stuff. Thank you!
@sonianuj
@sonianuj Ай бұрын
Thank you for watching, and for leaving a comment! Very happy to hear you found it helpful.
@traemorris9683
@traemorris9683 Ай бұрын
I finished up a SANS cyber immersion academy recently and one of my favorite topics we touched on was using GDB to place breakpoints within an assembly program to gain a better understanding of the stack vs the heap and how memory works. This video really reignited a fire in me to want to learn more about debugging and reverse engineering. Thank you!
@sonianuj
@sonianuj 28 күн бұрын
Glad to hear that the video resonated with you! Love the passion you have for the topic - it's why I make these videos :-).
@memeemperor4154
@memeemperor4154 Ай бұрын
Excellent contents!!!
@sonianuj
@sonianuj Ай бұрын
Thank you!
@sonianuj
@sonianuj Ай бұрын
After watching the video, check out this GitHub thread for some additional clarifying information: github.com/hasherezade/mal_unpack/issues/6
@Bakesyy
@Bakesyy Ай бұрын
Awesome videos mate. Would love to see a video on bypassing malware Anti-Analysis techniques. May or may not be battling with some samples and this is some of the best Malware Analysis content I’ve found on YT!
@sonianuj
@sonianuj Ай бұрын
Thanks so much! Would love to do some anti-analysis videos. If you’re battling any specific techniques, let me know and perhaps I can cover them!
@Bakesyy
@Bakesyy Ай бұрын
@@sonianuj Thanks! I would say for a video, it would be best to start with the easy ones and work your way through to more complex stuff. Maybe a top 5 or 10 common methods. In terms of my current battle, I can consistently bypass the easy checks for a debugger by altering ZF at jumps or EAX values on API returns but unfortunately actually don't know what check is stopping me at the moment. I suspect I am making it harder than it needs to be due to inexperience. I can see the beginnings of the malicious executable being decoded in memory, from scattered chunks of encoded data stored in the .text section... Best I can hope for is to get onto GREM (wishlist item) or hope you cover it in a video or have a helpful hint for me :)
@Mozart7406
@Mozart7406 Ай бұрын
Great video, thank you!
@sonianuj
@sonianuj Ай бұрын
Appreciate it, thanks for watching!
@dattatreysharma7161
@dattatreysharma7161 Ай бұрын
Thanks for the amazing video Anuj! Unfortunately password "infected" isn't working for extracting mount.zip
@sonianuj
@sonianuj Ай бұрын
Sorry about that! I’m not near my computer right now - but can you try using the password “malware”?
@dattatreysharma7161
@dattatreysharma7161 Ай бұрын
@sonianuj yes able to extract now, Thanks Anuj!
@sonianuj
@sonianuj Ай бұрын
Just a note for anyone else who sees this comment - I updated the password for mount.zip to be "infected" as described in the video description. Thank you!
@ghostdracula78945612
@ghostdracula78945612 Ай бұрын
enable automatic dubbing on your channel
@sonianuj
@sonianuj Ай бұрын
Thanks for the suggestion, I'll definitely look into it!
@gandalf9526
@gandalf9526 Ай бұрын
Thanks a lot for making these videos! They're really well structured and they provide decent information for people that are into malware analysis.
@sonianuj
@sonianuj Ай бұрын
Thank you for leaving a comment. Glad to hear you're benefitting from the videos!
@nickswink7983
@nickswink7983 Ай бұрын
Could you do a video on analyzing samples that use direct syscalls?
@sonianuj
@sonianuj Ай бұрын
I was thinking about this topic a few months ago! Appreciate the comment, will move this higher on my list!
@MoisesCerqueira-fv6hb
@MoisesCerqueira-fv6hb Ай бұрын
Awesome content. Perfect explanation and very educative. Greetings from Brazil
@sonianuj
@sonianuj Ай бұрын
Very much appreciate the feedback!
@InfosecGeekz
@InfosecGeekz Ай бұрын
Great Piece of Advices 👍
@sonianuj
@sonianuj Ай бұрын
Thank you!
@drewwally2702
@drewwally2702 Ай бұрын
Great video and I like the series building on the previous videos. Hasherzede has awesome repos, hollows_hunter is another great tool.
@Faisal-t4h2b
@Faisal-t4h2b Ай бұрын
useful
@mustaphaaitichou1519
@mustaphaaitichou1519 Ай бұрын
Thank you for sharing very informative.
@sonianuj
@sonianuj Ай бұрын
Absolutely, thanks for watching!
@Mezzosd
@Mezzosd Ай бұрын
nice
@LevonSarkisov-m6h
@LevonSarkisov-m6h Ай бұрын
Please, just don't stop to make new videos!
@dxlge
@dxlge Ай бұрын
So glad to see you posting more, great video.
@sonianuj
@sonianuj Ай бұрын
Thanks so much! Glad you enjoyed it.
@Teo97b
@Teo97b Ай бұрын
welcome back, mr Anuj Soni
@sonianuj
@sonianuj Ай бұрын
🫡
@FatimaAli39634
@FatimaAli39634 Ай бұрын
❤❤❤❤
@FatimaAli39634
@FatimaAli39634 Ай бұрын
❤❤❤❤
@FatimaAli39634
@FatimaAli39634 Ай бұрын
❤❤❤❤
@bind292
@bind292 Ай бұрын
Very useful information!! 👍 It would interesting to see how can shellcode be mapped to to a specific shellcode generation framework/ extract C2s and other relevant data. I know that speakeasy might help with that. Would you like to share how you approach such scenarios? Thank you for your content, it is very valuable and easy to follow.
@sonianuj
@sonianuj Ай бұрын
Great ideas, I plan to cover approaches like using speakeasy (emulation) in upcoming videos!
@Bchicken2
@Bchicken2 Ай бұрын
Great video on mal_unpack, looking forward to the analysis part on the next video!
@sonianuj
@sonianuj Ай бұрын
Thanks for watching!
@yur5670
@yur5670 2 ай бұрын
These videos are really high quality. Amazing work
@sonianuj
@sonianuj 2 ай бұрын
Appreciate that, thanks for watching!
@CosmodiumCS
@CosmodiumCS 2 ай бұрын
Great video, Anuj! I love how you explain common patterns you look for when going through the analysis process.
@manassalian
@manassalian 2 ай бұрын
Excellent video Anuj. Could you possibly discuss about the job prospects for a malware analyst and the skills required for such a job. Thank you
@sonianuj
@sonianuj Ай бұрын
Hi there, thank you! I appreciate the suggestion and will definitely give this some thought. Generally on the the channel I'm trying to focus on technical demos, but perhaps there is a different format I can use to share my thoughts on the topic you suggested (future live stream, community section of KZbin). I'll reflect on this some more, thanks again.
@DeesDots
@DeesDots 2 ай бұрын
accidentally stumped on your channel and it was a bless, this is Top Studio Quality tutorials from a professional Progressive instructions (without stuttering or waffling to fill the time with empty talks), to a clean video quality , to the Tools used in the video mentioned in description , to a clean Audio Quality and pronunciation , all boxes checked ✔ , you may wonder why i mention "good pronunciation", that is because 90% of the time on youtube we suffer from videos that you can't even understand what they saying "bad audio quality, and bad pronunciations with some hard accents" . its hard to find a channel that sticks to professional standards like yours . well done , you deserve millions of subscribers
@sonianuj
@sonianuj 2 ай бұрын
Wow, thank you so much for the kind words! 🙏
@davidmohan2698
@davidmohan2698 2 ай бұрын
Are you able to make a video detailing API hashing?
@sonianuj
@sonianuj Ай бұрын
Hi @davidmohan2698. It's a great suggestion, but also something that takes quite a bit of time to discuss properly (I spend more than an hour digging into the specifics in my SANS 710 course). To be honest, so far, my KZbin stats indicate people watch my videos for 5 minutes on average. If I see an uptick in those numbers and more interest in longer videos, I'll definitely reconsider though. Again, I really appreciate you offering a suggestion!
@RhysFrostt
@RhysFrostt 2 ай бұрын
More content...Yes please!
@purekillah
@purekillah 2 ай бұрын
The hex values is api hashing at work. I believe you go into great detail about this in your FOR710 course.
@sonianuj
@sonianuj 2 ай бұрын
You got it!
@natedunlap9226
@natedunlap9226 2 ай бұрын
Really excited to see the rest of this series. Keep up the amazing work!
@sonianuj
@sonianuj 2 ай бұрын
Thanks so much!
@Drew-bugfireio
@Drew-bugfireio 2 ай бұрын
seems likely API hashing going on there
@sonianuj
@sonianuj 2 ай бұрын
You got it!
@Drew-bugfireio
@Drew-bugfireio 2 ай бұрын
Great as always, thanks for the new series!
@boogieman97
@boogieman97 2 ай бұрын
The hex references are memory addresses to dynamically resolve Windows API's, known as API hashing. Correct ?
@sonianuj
@sonianuj 2 ай бұрын
You got it!
@boogieman97
@boogieman97 2 ай бұрын
Welcome back Anuj, very happy to see a notification that you placed another video! Do you know by any chance if FOR710, will get an exam ? I did the course in January 2023, with Nick as instructor. Would look forward to certify this one.
@sonianuj
@sonianuj 2 ай бұрын
Thanks, it’s good to be back! Regarding the exam, unfortunately it’s completely out of my control. I do hope GIAC creates an exam soon, but I’m not aware of the timeline.
@boogieman97
@boogieman97 2 ай бұрын
@sonianuj for what they told me back then it highly depends on the subscription and interest for the course. I can imagine it needs to be profitable. Apart from all of that, the course content is amazing, highly recommendable, I have learned so much from it.
@mustaphaaitichou1519
@mustaphaaitichou1519 2 ай бұрын
Amazing video and good explaination thank you for sharing.
@sonianuj
@sonianuj 2 ай бұрын
My pleasure!
@Mezzosd
@Mezzosd 2 ай бұрын
how to find strings using dbg and modify them?
@sonianuj
@sonianuj 2 ай бұрын
Not exactly sure if I understand your question - but in general, if you view strings in x64dbg (right-click > Search for > Current Region > String references), you can dump any string to the dump window and edit those bytes.
@samjohn1098
@samjohn1098 2 ай бұрын
Thanks for the video indeed useful waiting for part 2
@sonianuj
@sonianuj 2 ай бұрын
Thank you for watching!
@damianlaw1689
@damianlaw1689 2 ай бұрын
Excellent video! I really appreciate how you explain how to identify malicious patterns used by malware, even when they are very simple. It’s incredibly helpful for beginners starting with malware analysis at the ASM level.
@sonianuj
@sonianuj 2 ай бұрын
Glad you enjoyed it!
@Aaron199s
@Aaron199s 2 ай бұрын
I'm assuming those hex values are the expected hash values for certain modules that the malware wants to locate and load?
@sonianuj
@sonianuj 2 ай бұрын
You got it, API hashing at work!
@LevonSarkisov-m6h
@LevonSarkisov-m6h 2 ай бұрын
Unfortunately your videos so rare...
@sonianuj
@sonianuj 2 ай бұрын
Hoping to change that. Stay tuned!
@Bchicken2
@Bchicken2 2 ай бұрын
Thank you for the video! It was really useful 👍
@sonianuj
@sonianuj 2 ай бұрын
You’re welcome, glad it was helpful!