Completed
Announcement
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Indicators of Compromise - From Malware Analysis to Eradication
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 About me
- 3 Malware Research Lab, 2012
- 4 How INT3 breakpoints work
- 5 Memory Breakpoints
- 6 Hardware breakpoints
- 7 Timing
- 8 Windows Internals
- 9 Debug Object Handle
- 10 Thread Hiding
- 11 Open Process
- 12 Parent Process
- 13 UnhandledExceptionFilter
- 14 Process Exploitation
- 15 Nanomites
- 16 Stolen Bytes (Stolen Code)
- 17 Virtual Machines (think JVM, not Box)
- 18 Guard Pages
- 19 Removing the PE Header
- 20 Anti-dumping
- 21 Exploiting IA-32 Instructions
- 22 Interrupt 2D
- 23 Stack Segment
- 24 Instruction Prefixes
- 25 Exploiting LA-32 Instructions
- 26 VM Detection
- 27 Debugger specific techniques
- 28 Other Techniques
- 29 Announcement