0 to 31337 Real Quick - Lessons Learned by Reversing the Flare On Challenge

0 to 31337 Real Quick - Lessons Learned by Reversing the Flare On Challenge

via YouTube Direct link

MSDOS Header: Modified

13 of 36

13 of 36

MSDOS Header: Modified

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

0 to 31337 Real Quick - Lessons Learned by Reversing the Flare On Challenge

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Flare-On Challenge
  3. 3 Reverse Engineering 101
  4. 4 RE 101: Analysis Strategy
  5. 5 RE 101: Light vs Deep Static Analysis
  6. 6 RE 101: Light vs Deep Dynamic Analysis
  7. 7 Analysis Feedback Loop
  8. 8 File Type
  9. 9 PE File Format
  10. 10 Import Hints - What can it do?
  11. 11 MSDOS Stub Code: Normal
  12. 12 MSDOS Stub Code: Modified
  13. 13 MSDOS Header: Modified
  14. 14 Why base64?
  15. 15 Base64 Encoding: Internals
  16. 16 Base64, hmmm..
  17. 17 Custom Alphabet
  18. 18 MiniDuke (APT29) cont.
  19. 19 Simple Encryption
  20. 20 XOR Drawbacks
  21. 21 Rolling XOR Algorithm
  22. 22 Rolling XOR Inverse-Algorithm
  23. 23 RC4
  24. 24 Hashing - Recognizing
  25. 25 Hashing: How to hide constants
  26. 26 Hashing - ROR13
  27. 27 Hashing - Other uses?
  28. 28 Anti-Analysis Techniques
  29. 29 Javascript Obfuscation
  30. 30 Challenge #10
  31. 31 Packers
  32. 32 Packer Stub: Challenge #8
  33. 33 Anti-Disassembly: Challenge #8
  34. 34 Tricking Flow-Oriented Disassemblers
  35. 35 Anti-Debugging Checks
  36. 36 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.