Reverse Engineering Windows Exploit Mitigations - Do Not Allow Child Proc

  Рет қаралды 1,193

Off By One Security

Off By One Security

Күн бұрын

Пікірлер: 9
@anantP-ip8op
@anantP-ip8op Жыл бұрын
Hello captain! I am trying to get into malware analysis as a career but I feel malware development should be learnt first for a good analysis career. Whats your take on malware development ( maldev academy ) ? They are teaching C and internals as well.
@OffByOneSecurity
@OffByOneSecurity Жыл бұрын
I haven't looked at maldev academy. That sounds great though, if they are teaching C fundamentals and OS internals. Those are of course critical to both malware analysis and exploit dev. There are certainly similarities and overlap between the two focus areas, but they are also very different. It's fun to pivot back and forth between the two.
@kenny-ze8eg
@kenny-ze8eg 8 ай бұрын
I've been trying to learn everythin possible to fix my systems after being hit with ransomware. After the place my providers told me to take my devices to Said "fixed" my chromebook. But only put an enterprise version of chromeOS.i also switched emails and tried recovering my old email to save my kids pictures, so I try finding a tool to fix my windows pcs, but only having chromeOS Linux. Then I look up how to run it on windows. Thinking it would run the windows prompt where it asks "do u want to trust this program" it asked if I was doing it as root. And hollyyy crap. Now I can't seem to get nobody to believe a word I say about it. But the hash file of the program says it doesn't match. I do understand I made mistakes that where pretty dumb. But if they took into consideration on "why" I was watching the videos step by step is bc I had a massive head injury when I was younger messing up my frontal cortex. But I also had found a wireshark network and bunch of other crap where I was basically screwed any way I turn. Now I'm just trying to consume info and know it 100% so I don't make what's worse than screwed up. Even worse. Also found a 3rd party app under a weird name (Sorry for the long comment, alot to consume)
@OffByOneSecurity
@OffByOneSecurity 7 ай бұрын
I wish you the best. Sounds like quite the challenging situation. Best of luck to you.
@kenny-ze8eg
@kenny-ze8eg 7 ай бұрын
@OffByOneSecurity yeah it's quite insane, but I wish the research community would help me get through this. Because if they would hear my full story. Idk if you heard about the xz backdoor thing. But if you compare my story to how the function of the backdoor worked. And compare my story. About the open-source tool. The mistake of running it as root on accident after being manipulated with KZbin results after the original randomware. Then how the Jia tan account was made around the same time I was compromised. And when I ran that tool holy shit man. And now these 3rd party app on my phone under "project-numbers" and on my chromebook there is a excluded file Path that's like. Node\|/.git\|/project\|/idea\|/bowers\|/modules. And basically if they took all my story and the videos explaining the xz backdoor and that story. That binary blob that was committed was "maybe???" That tool I got manipulated into running as root. Im not 1000% sure. But I've been reporting and trying to fix my mistake, and plus track down that prick by figuring out who this wireshark network is registered too.
@0xkhaotic
@0xkhaotic Жыл бұрын
dang. i missed the stream. normally earlier in the day
@gstud210
@gstud210 Жыл бұрын
Let's gooo
@0xUnixy
@0xUnixy Жыл бұрын
360p !!! very sad.
@braxton5417
@braxton5417 Жыл бұрын
*promo sm* 😁
IDA Pro Productivity Tips & Tricks!
1:43:23
Off By One Security
Рет қаралды 1,6 М.
Linux System Administration Full Course
6:41:06
My CS
Рет қаралды 345 М.
I thought one thing and the truth is something else 😂
00:34
عائلة ابو رعد Abo Raad family
Рет қаралды 22 МЛН
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 43 МЛН
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 97 МЛН
Understanding Microarchitecture
1:43:27
Off By One Security
Рет қаралды 7 М.
LAVROV's interview with Tucker CARLSON 😁 [Parody]
8:34
Юрий ВЕЛИКИЙ
Рет қаралды 275 М.
Selling Exploits for Profit! Memory Corruption Bugs and Binary Exploitation...
1:35:02
CSC2000 12/5/24 static vs non-static and toString method
1:19:24
Michael Litman
Рет қаралды 35
Emulating Obfuscated Code
1:46:50
Off By One Security
Рет қаралды 1,9 М.
Tactical Multi-Factor Authentication (MFA) Bypass Attacks
1:20:29
Off By One Security
Рет қаралды 1,4 М.
SIG Cloud Provider 2024-12-04
23:17
Michael McCune
Рет қаралды 5
Seek Out New Protocols, and Boldly Go Where No One has Gone Before!
1:08:27
Off By One Security
Рет қаралды 1,3 М.
I thought one thing and the truth is something else 😂
00:34
عائلة ابو رعد Abo Raad family
Рет қаралды 22 МЛН