13-Odds and Ends.mp4

13-Odds and Ends.mp4

Preview unavailable

You must log in or sign up to view this lesson.

LoginSign up

Malware Analysis and Development

Buy nowLearn more

Introduction

  • 00-Introduction.mp4
  • MalwareAnalysisAndDevelopmentLabs.pdf
  • MalwareAnalysisAndDevelopment.pdf
  • Labs.zip
  • Demos.zip
  • Malware Samples.zip
  • Malware Samples Zip Password

Windows Internals Overview

  • 1-Processes.mp4
  • 2-Task Manager.mp4
  • 3-Process Explorer.mp42
  • 4-Virtual Memory.mp42
  • 5-Threads.mp44
  • 6-System Architecture.mp42
  • 7-APIs.mp4
  • 8-Objects and Handles.mp45
  • 9-Labs Intro.mp4

Windows Application Development Fundamentals

  • 1-Application Development Fundamentals.mp4
  • 2-Working with Strings.mp4
  • 3-System Information.mp4
  • 4-Working with Handles.mp4
  • 5-Sharing Objects by Name.mp42
  • 6-Duplicating Handles.mp4
  • 7-Object Names and Sessions.mp4
  • 8-Sessions.mp4
  • 9-Private Object Namespace.mp4

Processes, Memory and Threads

  • 1-Process Creation.mp4
  • 2-The CreateProcess API.mp4
  • 3-Process Termination.mp4
  • 4-Labs Solution Walkthrough.mp4
  • 5-DllMain.mp4
  • 6-Process and Thread Attributes.mp4
  • 7-Process Enumeration.mp4
  • 8-PEB and Other Details.mp4
  • 9-Process Memory.mp4
  • 10-Reserving and Committing Memory.mp4
  • 11-Heaps.mp4
  • 12-Threads Basics.mp4
  • 13-Creating Threads.mp4
  • 14-Odds and Ends.mp4

Dynamic Link Libraries

  • 1-Building DLLs.mp4
  • 2-Consuming DLLs.mp4
  • 3-Reducing Dependencies.mp4
  • 4-DLL Injection with a Remote Thread.mp42
  • 5-DLL Injection with an APC.mp4
  • 6-Odds and Ends.mp4

x86/x64 Fundamentals

  • 1-Operating Modes.mp4
  • 2-Assembling with Visual Studio.mp4
  • 3-x86/x64 Basics.mp4
  • 4-Operands and Address Modes.mp4
  • 5-Fundamental Instructions.mp4
  • 6-Calling External Functions.mp4
  • 7-Calling Conventions.mp4
  • 8-Bitwise Operations.mp4
  • 9-Branch Instructions.mp4
  • 10-The Stack.mp4
  • 11-Shellcode.mp4
  • 12-Injecting Shellcode.mp4
  • 13-Odds and Ends.mp4

.NET Fundamentals

  • .NET Fundamentals.mp4

COM Fundamentals

  • 1-COM Basics.mp4
  • 2-COM Concepts, Clients and Servers.mp4
  • 3-Creating and Using a COM Object.mp4
  • 4-Smart Pointers.mp4
  • 5-OLE/COM Object Viewer.mp4
  • 6-COM Activation in Detail.mp4

The Native API

  • 1-Native API Basics.mp4
  • 2-Object Manager and Native APIs.mp4
  • 3-Registry APIs.mp4
  • 4-Enumerating Processes and Handles.mp4

Introduction to Malware Analysis and Lab Setup

  • 1 - The Importance of Understanding and Dissecting TTPs.mp4
  • 2 - Introduction to Malware Analysis.mp4
  • 3 - Understanding AV-EDR Vendor Detection Names.mp4
  • 4 - Installing Flare-VM.mp4
  • 5 - PE 101 - Part 1.mp4
  • 6 - PE 101 - Part 2.mp4
  • 7 - Strings.mp4
  • 8 - Packing Detection - Part 1.mp4
  • 9 - Packing Detection - Part 2.mp4
  • 10 - Packing Detection - Part 3.mp4
  • 11 - Detecting Malicious Functionality.mp4

Reverse Engineering .NET, VBA and Shellcode Malware

  • 1 - Introduction to the SolarWinds Sunburst Attack.mp4
  • 2 - Sunburst Backdoor Initial Analysis.mp4
  • 3 - Sunburst Backdoor Backtracking (Function Call Tree Analysis).mp4
  • 4 - Sunburst Backdoor Reverse Engineering - Part 1.mp4
  • 5 - Sunburst Backdoor Reverse Engineering - Part 2.mp4
  • 6 - Sunburst Backdoor Reverse Engineering - Part 3.mp4
  • 7 - Sunburst Backdoor Reverse Engineering - Part 4.mp4
  • 8 - Sunburst Backdoor Reverse Engineering - Part 5.mp4
  • 9 - VBA Macro Shellcode Analysis - Part 1.mp4
  • 10 - VBA Macro Shellcode Analysis - Part 2.mp4
  • 11 - VBA Macro Shellcode Analysis - Part 3.mp4

Reverse Engineering C/C++ Malware

  • 1 - DarkSide Ransomware Initial Analysis.mp4
  • 2 - Runtime Code Unpacking - Part 1.mp4
  • 3 - Runtime Code Unpacking - Part 2.mp4
  • 4 - Runtime Code Unpacking - Part 3.mp4
  • 5 - Dynamic API Resolve.mp4
  • 6 - Rebuilding the IAT (Import Address Table).mp4
  • 7 - DarkSide Ransomware TTPs Dissection - Part 1.mp4
  • 8 - DarkSide Ransomware TTPs Dissection - Part 2.mp4

Malware Development

  • 1-Minimal Executables.mp4
  • 2-DarkSide Malware Techniques.mp4
  • 3-Simple Memory Sharing.mp4
  • 4-Memory Mapped Files.mp4
  • 5-Payload in Resources.mp4
  • 6-More Techniques.mp4

Bonus Content

  • One Electron to Rule Them All.mp4
  • For serious people only - MAoS - Malware Analysis on Steroids.mp4