Completed
Detecting Virtualization Artifacts
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Malware Armor
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 About This Talk
- 3 Dynamic Analysis Intro
- 4 Process Explorer
- 5 Process Monitor
- 6 INetSim + Wireshark
- 7 Debugger Video
- 8 Static Analysis
- 9 PE Studio
- 10 010 Editor Templates
- 11 Types of Malware Armor
- 12 Detecting Virtualization Artifacts
- 13 Virtual Mac Address Detection
- 14 Emotet Anti-Virtualization - Kaspersky
- 15 IDA Script to Highlight Anti-VM Instructions
- 16 How do we bypass Anti-VM
- 17 Anti-Debugging
- 18 Timing Checks
- 19 Thread Local Storage (TLS) Callbacks
- 20 Anti-Disassembly
- 21 Two Types of Disassemblers
- 22 Breaking Your Disassembler
- 23 Interactive Disassembler
- 24 Shiva Anti-RE
- 25 Shiva RE Redefined
- 26 Veil Framework
- 27 Obfuscation
- 28 XOR
- 29 Cryptography
- 30 Top Packers
- 31 Unpacking Tools
- 32 Memory Collection
- 33 Yara - "pattern matching swiss knife"
- 34 Conclusion
- 35 References
- 36 FIDELIS