Completed
Getting Started with Ghidra: Analyzing Process Hollowing Shellcode from a Maldoc
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Current Malware Analysis
Automatically move to the next video in the Classroom when playback concludes
- 1 How-To: Making a Protected VBA Project Viewable with EvilClippy
- 2 Extracting ZIP files from PCAP with Wireshhark & NetworkMiner, plus analysis with CyberChef
- 3 How-To: Installing Oledump in Windows
- 4 Creating an IDA Python Plugin for Static XOR String Deobfuscation
- 5 [11/10/2020] Emotet Maldoc Analysis - Embedded DLL and CertUtil for Base64 Decoding
- 6 Using Ghidra to Statically XOR Obfuscated Shellcode
- 7 Webinar - Installing and Configuring Suricata with Cuckoo Sandbox (04/02/2020)
- 8 Setting Up Cuckoo Sandbox v2.0.7 on Ubuntu 18.04.4 - Part 2
- 9 Setting up Cuckoo Sandbox v2.0.7 on Ubuntu 18.04.4 - Part 1
- 10 Unpacking a Trojan with Ghidra and x64dbg
- 11 Getting Started with Ghidra: Analyzing Process Hollowing Shellcode from a Maldoc
- 12 Unpacking Malware that uses AutoIt
- 13 Using Visual Studio to Debug JavaScript via Windows Script Host (WSH)
- 14 Excel document uses external data connection for next stage payload
- 15 Finding Macro Content in a Spreadsheet Cell
- 16 Analyzing Macros with the Office IDE
- 17 Macro analysis on an Emotet dropper (office document) from 01/17/2020