please make on video how to bypass Vmprotect .exe files
@James-k2p8y14 күн бұрын
Amazing
@DEVStoreApp16 күн бұрын
Amazing content bro 😎 we’re subscribers as of now learning a lot too by the way thx ☺️
@sonianuj13 күн бұрын
Appreciate the kind words!
@joeypatrick258518 күн бұрын
This may be the clearest and easiest to understand overview of BNinja on the planet. Total respect for your work!
@sonianuj13 күн бұрын
Thank you so much!
@infinit3i19 күн бұрын
i needed this
@sonianuj19 күн бұрын
So happy to hear it was helpful!
@VoiceOfASikhАй бұрын
Excellent guidance! Thanks for sharing this informative video.
@sonianuj29 күн бұрын
Thanks for watching! Glad to hear you enjoyed it!
@dimajaykobson7506Ай бұрын
Awesome stuff. Thank you!
@sonianujАй бұрын
Thank you for watching, and for leaving a comment! Very happy to hear you found it helpful.
@traemorris9683Ай бұрын
I finished up a SANS cyber immersion academy recently and one of my favorite topics we touched on was using GDB to place breakpoints within an assembly program to gain a better understanding of the stack vs the heap and how memory works. This video really reignited a fire in me to want to learn more about debugging and reverse engineering. Thank you!
@sonianuj28 күн бұрын
Glad to hear that the video resonated with you! Love the passion you have for the topic - it's why I make these videos :-).
@memeemperor4154Ай бұрын
Excellent contents!!!
@sonianujАй бұрын
Thank you!
@sonianujАй бұрын
After watching the video, check out this GitHub thread for some additional clarifying information: github.com/hasherezade/mal_unpack/issues/6
@BakesyyАй бұрын
Awesome videos mate. Would love to see a video on bypassing malware Anti-Analysis techniques. May or may not be battling with some samples and this is some of the best Malware Analysis content I’ve found on YT!
@sonianujАй бұрын
Thanks so much! Would love to do some anti-analysis videos. If you’re battling any specific techniques, let me know and perhaps I can cover them!
@BakesyyАй бұрын
@@sonianuj Thanks! I would say for a video, it would be best to start with the easy ones and work your way through to more complex stuff. Maybe a top 5 or 10 common methods. In terms of my current battle, I can consistently bypass the easy checks for a debugger by altering ZF at jumps or EAX values on API returns but unfortunately actually don't know what check is stopping me at the moment. I suspect I am making it harder than it needs to be due to inexperience. I can see the beginnings of the malicious executable being decoded in memory, from scattered chunks of encoded data stored in the .text section... Best I can hope for is to get onto GREM (wishlist item) or hope you cover it in a video or have a helpful hint for me :)
@Mozart7406Ай бұрын
Great video, thank you!
@sonianujАй бұрын
Appreciate it, thanks for watching!
@dattatreysharma7161Ай бұрын
Thanks for the amazing video Anuj! Unfortunately password "infected" isn't working for extracting mount.zip
@sonianujАй бұрын
Sorry about that! I’m not near my computer right now - but can you try using the password “malware”?
@dattatreysharma7161Ай бұрын
@sonianuj yes able to extract now, Thanks Anuj!
@sonianujАй бұрын
Just a note for anyone else who sees this comment - I updated the password for mount.zip to be "infected" as described in the video description. Thank you!
@ghostdracula78945612Ай бұрын
enable automatic dubbing on your channel
@sonianujАй бұрын
Thanks for the suggestion, I'll definitely look into it!
@gandalf9526Ай бұрын
Thanks a lot for making these videos! They're really well structured and they provide decent information for people that are into malware analysis.
@sonianujАй бұрын
Thank you for leaving a comment. Glad to hear you're benefitting from the videos!
@nickswink7983Ай бұрын
Could you do a video on analyzing samples that use direct syscalls?
@sonianujАй бұрын
I was thinking about this topic a few months ago! Appreciate the comment, will move this higher on my list!
@MoisesCerqueira-fv6hbАй бұрын
Awesome content. Perfect explanation and very educative. Greetings from Brazil
@sonianujАй бұрын
Very much appreciate the feedback!
@InfosecGeekzАй бұрын
Great Piece of Advices 👍
@sonianujАй бұрын
Thank you!
@drewwally2702Ай бұрын
Great video and I like the series building on the previous videos. Hasherzede has awesome repos, hollows_hunter is another great tool.
@Faisal-t4h2bАй бұрын
useful
@mustaphaaitichou1519Ай бұрын
Thank you for sharing very informative.
@sonianujАй бұрын
Absolutely, thanks for watching!
@MezzosdАй бұрын
nice
@LevonSarkisov-m6hАй бұрын
Please, just don't stop to make new videos!
@dxlgeАй бұрын
So glad to see you posting more, great video.
@sonianujАй бұрын
Thanks so much! Glad you enjoyed it.
@Teo97bАй бұрын
welcome back, mr Anuj Soni
@sonianujАй бұрын
🫡
@FatimaAli39634Ай бұрын
❤❤❤❤
@FatimaAli39634Ай бұрын
❤❤❤❤
@FatimaAli39634Ай бұрын
❤❤❤❤
@bind292Ай бұрын
Very useful information!! 👍 It would interesting to see how can shellcode be mapped to to a specific shellcode generation framework/ extract C2s and other relevant data. I know that speakeasy might help with that. Would you like to share how you approach such scenarios? Thank you for your content, it is very valuable and easy to follow.
@sonianujАй бұрын
Great ideas, I plan to cover approaches like using speakeasy (emulation) in upcoming videos!
@Bchicken2Ай бұрын
Great video on mal_unpack, looking forward to the analysis part on the next video!
@sonianujАй бұрын
Thanks for watching!
@yur56702 ай бұрын
These videos are really high quality. Amazing work
@sonianuj2 ай бұрын
Appreciate that, thanks for watching!
@CosmodiumCS2 ай бұрын
Great video, Anuj! I love how you explain common patterns you look for when going through the analysis process.
@manassalian2 ай бұрын
Excellent video Anuj. Could you possibly discuss about the job prospects for a malware analyst and the skills required for such a job. Thank you
@sonianujАй бұрын
Hi there, thank you! I appreciate the suggestion and will definitely give this some thought. Generally on the the channel I'm trying to focus on technical demos, but perhaps there is a different format I can use to share my thoughts on the topic you suggested (future live stream, community section of KZbin). I'll reflect on this some more, thanks again.
@DeesDots2 ай бұрын
accidentally stumped on your channel and it was a bless, this is Top Studio Quality tutorials from a professional Progressive instructions (without stuttering or waffling to fill the time with empty talks), to a clean video quality , to the Tools used in the video mentioned in description , to a clean Audio Quality and pronunciation , all boxes checked ✔ , you may wonder why i mention "good pronunciation", that is because 90% of the time on youtube we suffer from videos that you can't even understand what they saying "bad audio quality, and bad pronunciations with some hard accents" . its hard to find a channel that sticks to professional standards like yours . well done , you deserve millions of subscribers
@sonianuj2 ай бұрын
Wow, thank you so much for the kind words! 🙏
@davidmohan26982 ай бұрын
Are you able to make a video detailing API hashing?
@sonianujАй бұрын
Hi @davidmohan2698. It's a great suggestion, but also something that takes quite a bit of time to discuss properly (I spend more than an hour digging into the specifics in my SANS 710 course). To be honest, so far, my KZbin stats indicate people watch my videos for 5 minutes on average. If I see an uptick in those numbers and more interest in longer videos, I'll definitely reconsider though. Again, I really appreciate you offering a suggestion!
@RhysFrostt2 ай бұрын
More content...Yes please!
@purekillah2 ай бұрын
The hex values is api hashing at work. I believe you go into great detail about this in your FOR710 course.
@sonianuj2 ай бұрын
You got it!
@natedunlap92262 ай бұрын
Really excited to see the rest of this series. Keep up the amazing work!
@sonianuj2 ай бұрын
Thanks so much!
@Drew-bugfireio2 ай бұрын
seems likely API hashing going on there
@sonianuj2 ай бұрын
You got it!
@Drew-bugfireio2 ай бұрын
Great as always, thanks for the new series!
@boogieman972 ай бұрын
The hex references are memory addresses to dynamically resolve Windows API's, known as API hashing. Correct ?
@sonianuj2 ай бұрын
You got it!
@boogieman972 ай бұрын
Welcome back Anuj, very happy to see a notification that you placed another video! Do you know by any chance if FOR710, will get an exam ? I did the course in January 2023, with Nick as instructor. Would look forward to certify this one.
@sonianuj2 ай бұрын
Thanks, it’s good to be back! Regarding the exam, unfortunately it’s completely out of my control. I do hope GIAC creates an exam soon, but I’m not aware of the timeline.
@boogieman972 ай бұрын
@sonianuj for what they told me back then it highly depends on the subscription and interest for the course. I can imagine it needs to be profitable. Apart from all of that, the course content is amazing, highly recommendable, I have learned so much from it.
@mustaphaaitichou15192 ай бұрын
Amazing video and good explaination thank you for sharing.
@sonianuj2 ай бұрын
My pleasure!
@Mezzosd2 ай бұрын
how to find strings using dbg and modify them?
@sonianuj2 ай бұрын
Not exactly sure if I understand your question - but in general, if you view strings in x64dbg (right-click > Search for > Current Region > String references), you can dump any string to the dump window and edit those bytes.
@samjohn10982 ай бұрын
Thanks for the video indeed useful waiting for part 2
@sonianuj2 ай бұрын
Thank you for watching!
@damianlaw16892 ай бұрын
Excellent video! I really appreciate how you explain how to identify malicious patterns used by malware, even when they are very simple. It’s incredibly helpful for beginners starting with malware analysis at the ASM level.
@sonianuj2 ай бұрын
Glad you enjoyed it!
@Aaron199s2 ай бұрын
I'm assuming those hex values are the expected hash values for certain modules that the malware wants to locate and load?