An overview to unpacking methods, when to apply them and what generic approach to use for unpacking malware.
Malware Course:
Follow me on Twitter:
infographics: Environments/Infographics/
Additional resources:
- Packer identification:
- Virtualization based obfuscation:
- Skim for obvious XOR encryption:
- Run and Dump with PE-Sieve:
- Debugging and Breakpoints - Agniane Stealer:
- Memory Mapping:
- Dumpulator:
- Self-Extracting Patch:
1 view
0
0
2 months ago 00:31:23 1
Demystifying Modern Windows Rootkits
7 months ago 02:25:05 1
Теория и практика обучения защитников (Blue Team)
8 months ago 00:13:26 1
Malware Theory - Unpacking Approaches and Methods
1 year ago 00:02:13 1
C vs C++ vs C# [перевод на русский]
1 year ago 00:22:27 1
Making a Commodore C64 S-Video Cable
2 years ago 00:09:57 1
Malware Theory - Packer identifiers don“t tell you if a file is packed
2 years ago 00:14:00 1
Malware Theory - How Packers Work, Polymorphism and Misconceptions
2 years ago 00:19:38 107
Теории и практики расследования киберпреступлений
3 years ago 00:11:32 1
Malware Theory - Overview to Malware Vaccines
3 years ago 00:05:02 9
Cybersecurity and crime | Internet 101 | Computer Science | Khan Academy