02 - Performing Basic Triage Analysis and Unpacking with x64dbg

  Рет қаралды 1,195

Dr Josh Stroschein - The Cyber Yeti

Dr Josh Stroschein - The Cyber Yeti

Күн бұрын

Пікірлер: 8
@PANDACRAFTS1
@PANDACRAFTS1 Ай бұрын
Great video, thank you!
@jstrosch
@jstrosch Ай бұрын
Glad you enjoyed it, thanks for the feedback!
@81nembo
@81nembo 2 ай бұрын
Nice one, thanks!Don't you use ret-sync during debugging session to keep ida and x64dbg synced?I love it :-)
@jstrosch
@jstrosch 2 ай бұрын
Woah, I haven't heard of it before... going to check it out today! Thanks for the suggestion :)
@jordanj6841
@jordanj6841 Ай бұрын
Will you/have you made videos about samples we do not have the password for? Going in blind, so to speak?
@jordanj6841
@jordanj6841 Ай бұрын
Love your content btw!
@jstrosch
@jstrosch Ай бұрын
Thank you!
@jstrosch
@jstrosch Ай бұрын
I mention that in the first or second, you're likely stuck without the password and won't be able to analyze it. It won't run either, as it needs the password to unpack the main code. I haven't looked into the algorithm extensively, but a cursory glance suggests you need it!
03 - Identifying Signs of Runtime-Linking and Building Context for API Hashes
16:25
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 671
Tool Spotlight: Performing Rapid Triage Analysis using ANY.RUN!
23:01
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 409
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 122 МЛН
How Much Tape To Stop A Lamborghini?
00:15
MrBeast
Рет қаралды 220 МЛН
Learn How to Dissect Binary Files with the Creator of Malcat!
1:47:27
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 1,2 М.
how is this hacking tool legal?
11:42
Low Level
Рет қаралды 407 М.
01 - Getting Started with the Lockbit Builder and Creating Sample Binaries
7:00
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 1,3 М.
The AddressOfEntryPoint and Tips for Finding Main
13:17
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 1,4 М.
Why I Am Still Using Linux - And Won't Change It
20:31
NeuralNine
Рет қаралды 16 М.
05 - How Lockbit Uses the DLL Name as a Seed for API Hashing
14:12
Dr Josh Stroschein - The Cyber Yeti
Рет қаралды 502
Malware Analysis Bootcamp - Analyzing The PE Header
20:21
HackerSploit
Рет қаралды 58 М.
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 122 МЛН