Completed
OBFUSCATION TECHNIQUES
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hunting Evil - Threat Intelligence and Malware Analysis Techniques
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 A STORY ABOUT BOB
- 3 AN MEAN DETECTION RATE 17%
- 4 WHY THREAT INTELLIGENCE?
- 5 REDIRECTION CHAINS
- 6 USER AGENT STRINGS / REFERER
- 7 FROM A COMPROMISED SERVER
- 8 BASIC MODE
- 9 MONITOR MODE
- 10 INPUT MODE
- 11 INTERNET EXPLORER
- 12 FIREBUG EXTENSION FOR FIREFOX
- 13 OBFUSCATION TECHNIQUES
- 14 CONCATENATION
- 15 HEXADECIMAL CHARCODES
- 16 ARITHMETIC ON THE CHARCODE
- 17 STRING SPLITTING
- 18 CHARACTER REPLACEMENT
- 19 BASE32 CONVERSIONS
- 20 FUNCTION REFERENCES
- 21 BLACKHOLE EXPLOIT KIT
- 22 DECODING WITH PYTHON
- 23 BLACKHOLE DECODED
- 24 VIM FOLDING TO THE RESCUE!
- 25 PAYLOADS
- 26 GFI SANDBOX REPORT
- 27 GFI SANDBOX - REGISTRY KEYS
- 28 QUESTIONS?