06 - Finding Functions from the Export Directory and Using Seeds to Compute Checksums

  Рет қаралды 391

Dr Josh Stroschein - The Cyber Yeti

Dr Josh Stroschein - The Cyber Yeti

Күн бұрын

Пікірлер: 3
@Nobody-speedyspeedy
@Nobody-speedyspeedy 2 ай бұрын
I have a question what encryption ist used by Cryptomalware? Asymetric encryption? Or different encryption stacks? Rsa aes256 or Something Like this?
@jstrosch
@jstrosch 2 ай бұрын
Many use a hybrid approach - this article covers it well: en.wikipedia.org/wiki/Hybrid_cryptosystem
@Nobody-speedyspeedy
@Nobody-speedyspeedy 2 ай бұрын
@@jstrosch thank you
07 - Creating Trampolines and Re-Obfuscating Function Pointers
29:46
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 692
08 - Using ZwSetInformationThread to Detach Debuggers
9:21
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 343
Что-что Мурсдей говорит? 💭 #симбочка #симба #мурсдей
00:19
Learn How to Dissect Binary Files with the Creator of Malcat!
1:47:27
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 1,3 М.
Catching up with async Rust
17:55
fasterthanlime
Рет қаралды 20 М.
Intro to Data Oriented Design for Games
52:35
Nic Barker
Рет қаралды 37 М.
Exploring the Latest Malware Samples
15:21
John Hammond
Рет қаралды 111 М.
The Only Unbreakable Law
53:25
Molly Rocket
Рет қаралды 345 М.
Mac Malware with L0Psec - Triage, reversing and ARM64
1:28:54
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 659
Intro to the Zig Programming Language • Andrew Kelley • GOTO 2022
50:14
The Dome Paradox: A Loophole in Newton's Laws
22:59
Up and Atom
Рет қаралды 907 М.
how Google writes gorgeous C++
7:40
Low Level
Рет қаралды 976 М.
BEST WAY to read and understand code
17:24
The Cherno
Рет қаралды 167 М.