Completed
SEH Variation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Comparing Malicious Files
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 AV Problem
- 3 Marketing Problem
- 4 Missing Criteria
- 5 Researcher's Problem
- 6 Incident Responder's Problem
- 7 Sample Identification
- 8 Locating Associated Samples
- 9 Shared Engines
- 10 Development Methods
- 11 Vendors with Usable Results
- 12 Boiling Down Results
- 13 ATT&CK & Granularity
- 14 SEH Variation
- 15 Malpedia
- 16 Malware Classification Systems
- 17 Some Hashes
- 18 Exif metadata
- 19 Code Signing Certificate
- 20 Abused Certificates
- 21 PE Metadata
- 22 Sections
- 23 Resources
- 24 Document Metadata
- 25 Filenames
- 26 URL Structure: Download
- 27 URL Structure: C2
- 28 Mutual Exclusion (Mutex)
- 29 Registry key
- 30 Algorithms
- 31 Infosec Finer Things
- 32 Diamond Model
- 33 Control Flow Graph Analysis
- 34 Schema: STIX
- 35 JSON for Linking Data: JSON-LD
- 36 RDF N-Quad
- 37 Graph Tools: Graph Databases
- 38 Network Graph