No video

Creative Windows Evasion and Forensics with Yarden Shafir

  Рет қаралды 2,458

Off By One Security

Off By One Security

Күн бұрын

Where does malware hide when it wants to avoid detection? And what can you do to find it? Let’s look into some creative forensics techniques using WinDbg and other tools, to find potential evidence of malicious activity (and if you’re on the offensive side: places where defenders won’t think to look)!

Пікірлер: 14
@MarshallHallenbeck
@MarshallHallenbeck 3 ай бұрын
Yarden is seriously just a legend. This stuff alone is insane. She's literally writing raw debugging commands from memory like they're bash commands. Everyone should hope to achieve mastery of something even half as well as she understands this stuff.
@OffByOneSecurity
@OffByOneSecurity 2 ай бұрын
Agreed, she's great!
@Ethernel0
@Ethernel0 2 ай бұрын
Great content! cool tricks she used with the debugger! Thx:)
@unknownboi9084
@unknownboi9084 3 ай бұрын
Sir i wanted to ask a question about something. My mother just bought me a book called "Hacking:The Art of Exploitation". It's a great book but is it still relevant. I don't wanna make my mom sad that she bought me an irrelevant book, but is that good for a beginner guide for exploit development.??? Please answer.
@flrn84791
@flrn84791 3 ай бұрын
It is very much relevant to get a good idea of C, assembly, basic binary exploitation stuff like buffer overflows, format string vulns, etc. 100% recommend, that was my first "hacking" book and I loved it. I highly suggest to type the C examples along, compile them, debug them, try to exploit them yourself, don't just read the book, do the book.
@OffByOneSecurity
@OffByOneSecurity 2 ай бұрын
I agree with what @flrn84791 said. It's still a great book for the introduction to binary exploitation. It's all 32-bit, unlike today with 64-bit, and it also doesn't take into account exploit mitigations, which are the biggest challenge to those of us doing binary exploitation on modern OSes.
@Janek-eh2en
@Janek-eh2en 3 ай бұрын
excellent content
@sebas42etgtyht
@sebas42etgtyht 3 ай бұрын
Love it!
@z1poc
@z1poc 3 ай бұрын
Very intresting, a suggestion is to modify video preview to better show who is presenting
@daljeetbhati8353
@daljeetbhati8353 3 ай бұрын
Missed it 😭
@z1poc
@z1poc 3 ай бұрын
you can still see the entire live here on YT
@daljeetbhati8353
@daljeetbhati8353 3 ай бұрын
@@z1poc yeah watched it but live>>
@johnnywilliams2641
@johnnywilliams2641 2 ай бұрын
If you want a house no one can break into, just don't build a house.
Process Injection Techniques: Deep Dive into Process Hollowing & Shellcode
1:32:48
Selling Exploits for Profit! Memory Corruption Bugs and Binary Exploitation...
1:35:02
Son ❤️ #shorts by Leisi Show
00:41
Leisi Show
Рет қаралды 10 МЛН
طردت النملة من المنزل😡 ماذا فعل؟🥲
00:25
Cool Tool SHORTS Arabic
Рет қаралды 10 МЛН
Вы чего бл….🤣🤣🙏🏽🙏🏽🙏🏽
00:18
Prank vs Prank #shorts
00:28
Mr DegrEE
Рет қаралды 7 МЛН
Debugging Windows Internals with x64dbg!
1:17:11
Off By One Security
Рет қаралды 2,3 М.
Binary Ninja: 4.0 Feature stream!
2:47:58
VECTOR 35
Рет қаралды 2,8 М.
Low-Level x86-64 Architecture, Linking & Loading, Memory Management, etc...
1:26:46
Reverse Engineering macOS Malware
1:45:47
Off By One Security
Рет қаралды 1,9 М.
Security Research and Security Assessments of ICS Devices & Communications
1:33:33
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 1,5 МЛН
one of the craziest exploits i've ever seen
8:40
Low Level Learning
Рет қаралды 377 М.
Son ❤️ #shorts by Leisi Show
00:41
Leisi Show
Рет қаралды 10 МЛН