Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/davidbombal // Links to Synthetic Sample // Note that this sample contains evasion techniques from used by real world Malware without a Harmful Payload, so you can use this sample to follow along: From Malshare (Anyone can download for free): malshare.com/sample.php?action=detail&hash=96e4b4290473f1e567865497168d029ce1b2fa41279fbf1e3f452002360d486a From VirusTotal (Those with paid accounts can download)www.virustotal.com/gui/file/96e4b4290473f1e567865497168d029ce1b2fa41279fbf1e3f452002360d486a // Kyle's Social // X: x.com/d4rksystem LinkedIn: www.linkedin.com/in/kylecucci Website: securityliterate.com/ GitHub: github.com/d4rksystem // Evasive Malware Book // Evasive Malware by Kyle Cucci: US: amzn.to/3Nql2G2 UK: amzn.to/3BN6pu9 // KZbin video REFERENCE // Free Exploit development training (beginner and advanced) kzbin.info/www/bejne/gojQqmaqbZl0f9E Buffer Overflow Hacking Tutorial (Bypass Passwords): kzbin.info/www/bejne/mWOlp4Zoi9Z3jck // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: www.x.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming Up 00:53 - Brilliant Advert 02:18 - Intro 02:47 - Disclaimer 03:12 - Demo Overview 04:46 - Demonstration Begins 11:20 - Registry Editor 14:01 - Malware Checking 16:50 - x64dbg 21:10 - Language Codes 23:18 - Why Malware Checks Languages 25:42 - Origins of the Demo 28:33 - Malware Output 36:20 - Internet Connection 36:44 - Remnux 41:01 - Flare VM 43:00 - Evasive Malware Synopsis 45:48 - Virtualbox or VmWare 47:21 - Stack & Heap Definitions 48:21 - Evasive Malware Operating Systems 49:02 - Virtual Machine VS Sandbox 55:44 - Conclusion windows windows 11 windows 10 microsoft apple ios iphone android samsung exploit malware malware evasion how to write malware virtualbox virtual box vmware exploit development linux kali linux virus trojan trojan virus spyware ransomware worm Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #windows #malware #hacker
@ChrisGreer2 ай бұрын
Great work as always David! Love the malware example. You know I wanna see that thing at the packet level 🦈
@davidbombal2 ай бұрын
Need you to come back on the channel Chris! 😀
@ChrisGreer2 ай бұрын
@@davidbombal let’s do it! I’ll shoot you a text. 👍
@timothybradford82162 ай бұрын
Saved to watch later. I will return.
@davidbombal2 ай бұрын
I hope you enjoy the video 😀
@happilyevernever42892 ай бұрын
Stop procastinating, Timothy.
@aminech63422 ай бұрын
No you won't
@aminech63422 ай бұрын
Stop lying to yourself, we both know u won't
@LuvEvoLuv2 ай бұрын
I swear 😭 I thought I was the only one who randomly have hundreds of videos I have to watch, on the later , after later
@SavageScientist2 ай бұрын
I took a class on malware analysis and it was all in assembly my head is still smoking from that course.
@WestechIT8 күн бұрын
David, this is one of the best interview videos I've seen from you. You presented each question so beautifully that it felt like I was asking them myself. I found myself wondering when the video would end. If you create more videos like this, we can learn a lot. Waiting for the next episode with Kyle Cucci. Thank you, David!
@Glowup4Us2 ай бұрын
Thanks!
@0oNoiseo0Ай бұрын
Thank u for the interview. An fresh look with loads of directions to tinkle in the home lab
@lumikarhu2 ай бұрын
I've tried many techniques to achieve that, can't wait to see which one was used here!
@tejananda2841Ай бұрын
More content is covered... I really appreciate your hard work for providing this type of content, that is not available in paid courses too..
@TNInc-h9i2 ай бұрын
Need another brilliant video about malware analysis with Kyle.
@11d7th2 ай бұрын
Great video just watched the entire thing and man super pumped now. I’d love to see a video on email phishing/Malware analysis.
@abhijeetultimate2 ай бұрын
Thanks For This Video I was Looking for how to affect someone with malware before 2 day Now You Are Here
@Agent_Orange_Peel2 ай бұрын
Very cool. Love seeing how the malware actually works.
@OssieNewlon-s1d2 ай бұрын
Your explanations are clear and easy to follow!
@davidbombal2 ай бұрын
Glad to hear that!
@stanlee69692 ай бұрын
Awesome demo! It's definitely worth waiting for more!
@davidbombal2 ай бұрын
Glad you like it!
@LarryPike-l7c2 ай бұрын
This tutorial was incredibly well-executed!
@archangel5723Ай бұрын
This is truly interesting , at first it seems so complicated but then it's like playing the cat and the mouse , I love it.
@mitospha2 ай бұрын
This looks fun :) thank you for the share. Haven't heard of this book yet.
@Randy7782 ай бұрын
It´s allways a bit frightening when you´ve a vague idea about a topic and learn how there´re entire branches you had no idea they´d even existed. Thanx for the insights.
@Steve-ds6yl2 ай бұрын
Love to see a demo on rootkits
@cyberyaku2 ай бұрын
2 Cool Guys In the same place .thank you Mr.David
@csv93882 ай бұрын
Hi broooooo😅
@LaughingMan442 ай бұрын
This was a great intro to malware analysis. Would appreciate more content like this. Also if I understood this right, as a regular user you could install some of this tools and VMs to trick the malware to not run on your personal PC because it thinks it might be in a sandbox?
@lumikarhu2 ай бұрын
there are like tens of anti sandbox techniques to achieve that. question is how much are you interested and willing to check that yourself, because I can help a bit
@SylvesterHolland-z1x2 ай бұрын
This tutorial was incredibly valuable!
@human-being2 ай бұрын
I would like the demonstrator to explain about Assembly langue, as it would be easier to debug and understand it's functionality.
@oneloveafrica88602 ай бұрын
wow ... I need to watch more video like this. david
@gamereditor59ner222 ай бұрын
Sweet! Thank you for the video!
@human-being2 ай бұрын
Thanks a lot for making this video. It's a great boost for malware analyst like me.
@davidbombal2 ай бұрын
You are welcome
@Steve-ds6yl2 ай бұрын
Gonna get my degree from the university of david bombal youtube channel... Thank you David... great video
@mibonly2 ай бұрын
"This is not real." It is scary enough. Thanks for this video.
@bernardgarrett38972 ай бұрын
What about running malware in Hyper V?
@Kimberleeannreynolds2 ай бұрын
Very well done! Your guest was fantastic and explained AND showed what to do in a way that was easy to follow along with! Best channel in cybersecurity -OTW
@ESOTERIC34762 ай бұрын
Sir, why didn't you reviewed about hand held devises like Rog ally,x,legion go,claw,may be steam(uses linux based os)
@derdestroyer19302 ай бұрын
How to install kali linux nethunter on a rooted but unsupported phone?
@davesabra43202 ай бұрын
an analysis of 'polymorphic' malware that mutates would be cool
@Anime_Kenji2 ай бұрын
Gonna download it
@b15productions382 ай бұрын
We need a good topic about ss7 exploit which targets SIM card signal
@dalefernandez192 ай бұрын
Love from Sri Lanka 🇱🇰
@attahirabdulkadir58872 ай бұрын
Downloaded to watch later
@davidbombal2 ай бұрын
I hope you enjoy the video 😀
@attahirabdulkadir58872 ай бұрын
@@davidbombal always, thank you 🙏
@lofi.6.0.12 ай бұрын
Thank you so much sir Sharing this video ❤
@davidbombal2 ай бұрын
You're welcome!
@carsonjamesiv25122 ай бұрын
GOOD EXPLAINATIONS!😃
@davidbombal2 ай бұрын
Glad it was helpful!
@Sidrobot2 ай бұрын
thank you for this video we need more video like this thank you :-)
@RushalTripura2 ай бұрын
Who are malware pro they are god levels in hacking field ❤❤
@Victor_ivic1012 ай бұрын
Every day there are more and more meaningful lessons😏🙂↔️🙂↕️😌☺️😍
@anvayashakti23742 ай бұрын
Thank you, Sir David and Kyle🙏 it's another great content 👏 David could you please make a video about social engineering in hacking and cybersecurity. All the best for everyone
@alaminiumar2 ай бұрын
Thanks 😊 ❤. 🎉 Do a video about rootkit and zero click attacks
@kimblerothschild2 ай бұрын
Love from pakistan 🇵🇰 mr david make an video for an person who do have knowledge of cyber security but don't have much of an real practicle experience an road map video
@mere_naina2 ай бұрын
Seems harder than actually building exe
@jamesbrinn97012 ай бұрын
I looked up The book on Amazon in Canada, $91.50, No thanks
@AlexRitchie-p3g2 ай бұрын
Ima comment, if it wasn’t for you, I wouldn’t have been able to do what I’ve done, allegedly, with that being said, thank you nsa
@ProfessorO-h3f2 ай бұрын
Hello David, my name is V I would like to enjoy conversation with you all day
@paelnever2 ай бұрын
You forgot to say the most important about malware. Strictly talking windoze itself is the worst malware so the best way to get rid of all this trash is to use Linux.
@Kimberleeannreynolds2 ай бұрын
It was amazing!! Come back kyle, rootkit demo would be great. Thanks for the fantastic book.
@ANONYMOUSC-VIPERHACKER2 ай бұрын
Now your videos are not exciting now you don't do demo videos why everyday talking
@davidbombal2 ай бұрын
Seems like you are making comments without watching the videos. This video has a massive demo - most of the video is actually a demo.
@MartinoSolido2 ай бұрын
def fibonacci_iterative(n): fib = [0, 1] for i in range(2, n): fib.append(fib[i-1] + fib[i-2]) return fib # Example usage n = 99999999 # Get the first 10 Fibonacci numbers print(fibonacci_iterative(n))
@MartinoSolido2 ай бұрын
Collapse cpu
@user-yv7dt5je1l2 ай бұрын
I hope to write some sophisticated malware one day 🫶🏻