Malware Armor

Malware Armor

via YouTube Direct link

Conclusion

34 of 36

34 of 36

Conclusion

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Malware Armor

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 About This Talk
  3. 3 Dynamic Analysis Intro
  4. 4 Process Explorer
  5. 5 Process Monitor
  6. 6 INetSim + Wireshark
  7. 7 Debugger Video
  8. 8 Static Analysis
  9. 9 PE Studio
  10. 10 010 Editor Templates
  11. 11 Types of Malware Armor
  12. 12 Detecting Virtualization Artifacts
  13. 13 Virtual Mac Address Detection
  14. 14 Emotet Anti-Virtualization - Kaspersky
  15. 15 IDA Script to Highlight Anti-VM Instructions
  16. 16 How do we bypass Anti-VM
  17. 17 Anti-Debugging
  18. 18 Timing Checks
  19. 19 Thread Local Storage (TLS) Callbacks
  20. 20 Anti-Disassembly
  21. 21 Two Types of Disassemblers
  22. 22 Breaking Your Disassembler
  23. 23 Interactive Disassembler
  24. 24 Shiva Anti-RE
  25. 25 Shiva RE Redefined
  26. 26 Veil Framework
  27. 27 Obfuscation
  28. 28 XOR
  29. 29 Cryptography
  30. 30 Top Packers
  31. 31 Unpacking Tools
  32. 32 Memory Collection
  33. 33 Yara - "pattern matching swiss knife"
  34. 34 Conclusion
  35. 35 References
  36. 36 FIDELIS

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.