Completed
Using kimoon
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Emulating Packed Linux Malware Using the Unicorn Emulator Framework - DefCamp - 2019
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Who am I
- 3 What is malware packing
- 4 How malware packing works
- 5 Why people pack malware
- 6 Unpacking tools
- 7 Using a sandbox
- 8 Using kimoon
- 9 Overloading the Linux system
- 10 What is Unicorn
- 11 Executing a binary
- 12 Operating system
- 13 Loading into memory
- 14 Operating System Services
- 15 System Write Command
- 16 Bindings
- 17 Testing
- 18 Why reallife applications need more memory
- 19 System calls
- 20 Examples
- 21 Upx
- 22 Upx header
- 23 No idea
- 24 First things first
- 25 Unicorn Dump
- 26 PackerElf
- 27 ElfPacker
- 28 Code Cave
- 29 Why need a statically compiled binary
- 30 A typo
- 31 Documentation
- 32 MidgetPack
- 33 PasswordBased
- 34 Cryptography
- 35 Debugging
- 36 Malware Analysis
- 37 Conclusion
- 38 Python Code
- 39 Questions