Ghidra Code Analysis with Anuj Soni

  Рет қаралды 20,119

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Күн бұрын

Пікірлер: 16
@allTimeFavorite
@allTimeFavorite 3 жыл бұрын
This is the best course on Ghidra that I have found. No wasted time and clear, concise explanations.
@rohankar726
@rohankar726 2 жыл бұрын
how i download this exe file please guide me
@sonianuj
@sonianuj Жыл бұрын
Thank you for the feedback!
@TheEndOfMadness
@TheEndOfMadness 5 жыл бұрын
Excellent video. Not flashy, well edited, well spoken.
@sonianuj
@sonianuj Жыл бұрын
Thank you!
@davidbernal958
@davidbernal958 5 жыл бұрын
Thanks for the video, I look forward to seeing more content of this very useful tool on FOR610 class, great idea to make this series of videos and very well made. I also like the approach of making small videos that one can see while having lunch, etc. :) Keep up the good work.
@babybirdhome
@babybirdhome 4 жыл бұрын
This is awesome, Anuj! I can't wait to see more of these.
@Lucas01legend
@Lucas01legend 3 жыл бұрын
Could you provide the link to sample please?
@sonianuj
@sonianuj 3 жыл бұрын
FYI, the MD5 for this sample is db349b97c37d22f5ea1d1841e3c89eb4.
@neloangelo__13
@neloangelo__13 5 жыл бұрын
Thank you for spending your time making this video. Btw, you look like Dinesh from Silicon Valley lol.
@abandonedmuse
@abandonedmuse 3 жыл бұрын
Thank you! I was actually able to follow along! I learned a lot! Messing with some malware now. Heh heh. Hey you can deactivate malware with this right? I see a script called repair as well as one called clear flow and repAir. Can i fix my files with these? I have had nasty lol junk code on my machine i cannot kill for 3 years, I got ghidra to finally analyze and learn to fight back maybe make some bug bounty money...so being able to see the difference between a repaired file and the original would help me make a good case. Because otherwise I’m still a bit shaky with assembly. I love hunting though.
@Ma_X64
@Ma_X64 4 жыл бұрын
Thanks a LOOOOT!
@jangleman8146
@jangleman8146 5 жыл бұрын
It would be handy if you actually gave the MD5 of the exe!
@sonianuj
@sonianuj 3 жыл бұрын
Good point - the MD5 is db349b97c37d22f5ea1d1841e3c89eb4
@Enxuvjeshxuf
@Enxuvjeshxuf 3 жыл бұрын
MKBHD voice
Patching Binaries (with vim, Binary Ninja, Ghidra and radare2)
21:00
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН
My scorpion was taken away from me 😢
00:55
TyphoonFast 5
Рет қаралды 2,7 МЛН
HackadayU: Reverse Engineering with Ghidra Class 1
1:05:06
HACKADAY
Рет қаралды 233 М.
Ghidra - Journey from Classified NSA Tool to Open Source
47:36
Exploring Malware Analysis with Ghidra
40:46
Cyber from the Frontlines
Рет қаралды 198
Google CTF - BEGINNER Reverse Engineering w/ ANGR
39:47
John Hammond
Рет қаралды 289 М.
Reversing WannaCry Part 2 - Diving into the malware with #Ghidra
15:48
The Dome Paradox: A Loophole in Newton's Laws
22:59
Up and Atom
Рет қаралды 1,1 МЛН
PARKSIDE 65W USB Type-C Phone Charger
7:05
ErCan Everything
Рет қаралды 1,8 М.
IDA Pro Malware Analysis Tips
1:38:17
OALabs
Рет қаралды 117 М.
APT 101: Understanding Advanced Persistent Threats
41:25
Hive Systems
Рет қаралды 12 М.