Completed
RE 101: Light vs Deep Static Analysis
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
0 to 31337 Real Quick - Lessons Learned by Reversing the Flare On Challenge
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Flare-On Challenge
- 3 Reverse Engineering 101
- 4 RE 101: Analysis Strategy
- 5 RE 101: Light vs Deep Static Analysis
- 6 RE 101: Light vs Deep Dynamic Analysis
- 7 Analysis Feedback Loop
- 8 File Type
- 9 PE File Format
- 10 Import Hints - What can it do?
- 11 MSDOS Stub Code: Normal
- 12 MSDOS Stub Code: Modified
- 13 MSDOS Header: Modified
- 14 Why base64?
- 15 Base64 Encoding: Internals
- 16 Base64, hmmm..
- 17 Custom Alphabet
- 18 MiniDuke (APT29) cont.
- 19 Simple Encryption
- 20 XOR Drawbacks
- 21 Rolling XOR Algorithm
- 22 Rolling XOR Inverse-Algorithm
- 23 RC4
- 24 Hashing - Recognizing
- 25 Hashing: How to hide constants
- 26 Hashing - ROR13
- 27 Hashing - Other uses?
- 28 Anti-Analysis Techniques
- 29 Javascript Obfuscation
- 30 Challenge #10
- 31 Packers
- 32 Packer Stub: Challenge #8
- 33 Anti-Disassembly: Challenge #8
- 34 Tricking Flow-Oriented Disassemblers
- 35 Anti-Debugging Checks
- 36 Conclusion