Completed
Powershell and DnSpy tricks in .NET reversing – AgentTesla [Part2]
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Malware Analysis Tips and Tricks
Automatically move to the next video in the Classroom when playback concludes
- 1 Deobfuscation SmartAssembly 8+ and recreating Original Module SAE+DnSpy
- 2 Advanced DnSpy tricks in .NET reversing - Tracing, Breaking, dealing with VMProtect
- 3 Full malware analysis Work-Flow of AgentTesla Malware
- 4 Powershell and DnSpy tricks in .NET reversing – AgentTesla [Part2]
- 5 Powershell and DnSpy tricks in .NET reversing – AgentTesla [Part1]
- 6 Reversing CryptoCrazy Ransomware - PoC Decryptor and some Tricks
- 7 [2] Lokibot analyzing - spoofing GULoader and LokiBot C2 [part2] - INetSim + BurpSuite
- 8 Fast API resolving of REvil Ransomware related to Kaseya attack
- 9 [2] Lokibot analyzing - spoofing GULoader and LokiBot C2 [part1] - Own implementation in Python
- 10 [1] Lokibot analyzing - defeating GuLoader with Windbg (Kernel debugging) and Live C2
- 11 Visible vs Hidden vs VeryHidden Sheet - Excel Binary File Format (.xls)
- 12 Abusing External Resource References MSOffice [part1] - TEMPLATE_INJECTION
- 13 Abusing External Resource References MSOffice [part2] - OLEOBJECT_INJECTION