Emulating Packed Linux Malware Using the Unicorn Emulator Framework - DefCamp - 2019

Emulating Packed Linux Malware Using the Unicorn Emulator Framework - DefCamp - 2019

DefCamp via YouTube Direct link

Why people pack malware

5 of 39

5 of 39

Why people pack malware

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Emulating Packed Linux Malware Using the Unicorn Emulator Framework - DefCamp - 2019

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Who am I
  3. 3 What is malware packing
  4. 4 How malware packing works
  5. 5 Why people pack malware
  6. 6 Unpacking tools
  7. 7 Using a sandbox
  8. 8 Using kimoon
  9. 9 Overloading the Linux system
  10. 10 What is Unicorn
  11. 11 Executing a binary
  12. 12 Operating system
  13. 13 Loading into memory
  14. 14 Operating System Services
  15. 15 System Write Command
  16. 16 Bindings
  17. 17 Testing
  18. 18 Why reallife applications need more memory
  19. 19 System calls
  20. 20 Examples
  21. 21 Upx
  22. 22 Upx header
  23. 23 No idea
  24. 24 First things first
  25. 25 Unicorn Dump
  26. 26 PackerElf
  27. 27 ElfPacker
  28. 28 Code Cave
  29. 29 Why need a statically compiled binary
  30. 30 A typo
  31. 31 Documentation
  32. 32 MidgetPack
  33. 33 PasswordBased
  34. 34 Cryptography
  35. 35 Debugging
  36. 36 Malware Analysis
  37. 37 Conclusion
  38. 38 Python Code
  39. 39 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.