Completed
C-BASED METHOD HOOKING
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hijacking .NET to Defend PowerShell
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 GOALS
- 3 CONTENT OVERVIEW FOUNDATIONS
- 4 TIMELINE
- 5 PHISHING CAMPAIGNS
- 6 BAD MALWARE PICKUP LINES
- 7 OBFUSCATION
- 8 OFFENSIVE FRAMEWORKS
- 9 FOUNDATIONS of .NET
- 10 COMMON LANGUAGE RUNTIME (CLR)
- 11 JUST-IN-TIME COMPILER (JIT) METADATA LOOKUPS
- 12 STRONG NAMED ASSEMBLIES
- 13 NGEN ASSEMBLIES
- 14 POWERSHELL
- 15 AMSI BYPASSES
- 16 C# DLL INJECTION
- 17 NET ROOTKITS BINARY MODIFICATION
- 18 CLR PROFILING
- 19 SETTING IL HOOK
- 20 JIT COMPILER HOOKING
- 21 C-BASED METHOD HOOKING
- 22 SOLUTION RESULTS COMPARISON
- 23 TAKE AWAYS