Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Malware Evasion Techniques: API Unhooking (Malware Analysis & Reverse Engineering)

Автор: Anuj Soni

Загружено: 2023-12-21

Просмотров: 5010

Описание:

Description: In this video, we explore a malware evasion technique - API unhooking.

Timestamps:
00:00 - Intro
00:37 - Inline hooking explained
02:04 - Introducing frida-trace
04:12 - Static analysis of Gazprom ransomware
06:18 - Patching Gazprom sample
07:37 - Hooking Gazprom with frida-trace
09:50 - Identifying API unhooking code using x64dbg
12:14 - Reviewing API unhooking code using Ghidra
19:39 - Debugging API unhooking code using x64dbg

Have malware analysis questions or topics you'd like me to cover? Leave a comment and let me know!

SANS Malware Analysis Courses I Author and Teach:
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques ➡ https://sans.org/for610 (co-author)
FOR710: Reverse-Engineering Malware: Advanced Code Analysis ➡ https://sans.org/for710

Sample: https://github.com/as0ni/youtube-file...
Password: infected
Unzipped SHA-256: 32ec301f02dfa21932679726f07e30f9c807391aaf1044278c0e0b2c0dc8ebdf
Description: Gazprom Ransomware Sample

Tools
Frida: https://frida.re/
PEStudio: https://www.winitor.com/download
Process Hacker: https://processhacker.sourceforge.io/...
x64dbg: https://x64dbg.com/
Ghidra: https://ghidra-sre.org/

Find Anuj Soni on X: https://x.com/asoni
Connect on LinkedIn:   / sonianuj  

Malware Evasion Techniques: API Unhooking (Malware Analysis & Reverse Engineering)

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#5851 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "ZDXqrfG7hWc" ["related_video_title"]=> string(85) "Analyzing the FBI's Qakbot Takedown Code (Malware Analysis & Reverse Engineering)" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(9) "Anuj Soni" } [1]=> object(stdClass)#5824 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "Tc8Wl37uwYc" ["related_video_title"]=> string(51) "Decode Malware Strings with Conditional Breakpoints" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(9) "Anuj Soni" } [2]=> object(stdClass)#5849 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "uU0n3U4dASc" ["related_video_title"]=> string(25) "Malware Demo and Tutorial" ["posted_time"]=> string(27) "8 месяцев назад" ["channelName"]=> string(12) "David Bombal" } [3]=> object(stdClass)#5856 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "WJ7g234Qnyg" ["related_video_title"]=> string(60) "Binary Diffing with Ghidra's BSim Feature (Malware Analysis)" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(9) "Anuj Soni" } [4]=> object(stdClass)#5835 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "73KJQRqz_Ec" ["related_video_title"]=> string(28) "Protocol Reverse Engineering" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(7) "Prelude" } [5]=> object(stdClass)#5853 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "kNP7EyS87G4" ["related_video_title"]=> string(59) "The Static File Analysis Tools I Trust for Malware Analysis" ["posted_time"]=> string(19) "4 дня назад" ["channelName"]=> string(9) "Anuj Soni" } [6]=> object(stdClass)#5848 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "i-FFVM4cIXQ" ["related_video_title"]=> string(138) "База по Базам Данных - Storage (Индексы, Paging, LSM, B+-Tree, R-Tree) | Влад Тен Систем Дизайн" ["posted_time"]=> string(25) "2 недели назад" ["channelName"]=> string(15) "Влад Тен" } [7]=> object(stdClass)#5858 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "FKv7njCmJMU" ["related_video_title"]=> string(67) "Malware Analysis with capa & Binary Ninja Plugins (API Hashing)" ["posted_time"]=> string(23) "1 месяц назад" ["channelName"]=> string(9) "Anuj Soni" } [8]=> object(stdClass)#5834 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "Sv8yu12y5zM" ["related_video_title"]=> string(87) "Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra" ["posted_time"]=> string(19) "6 лет назад" ["channelName"]=> string(13) "stacksmashing" } [9]=> object(stdClass)#5852 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "7jnJbZIvQ5s" ["related_video_title"]=> string(91) "Авторизация и аутентификация | Глубокая теория 2025" ["posted_time"]=> string(19) "2 дня назад" ["channelName"]=> string(8) "TeaCoder" } }
Analyzing the FBI's Qakbot Takedown Code (Malware Analysis & Reverse Engineering)

Analyzing the FBI's Qakbot Takedown Code (Malware Analysis & Reverse Engineering)

Decode Malware Strings with Conditional Breakpoints

Decode Malware Strings with Conditional Breakpoints

Malware Demo and Tutorial

Malware Demo and Tutorial

Binary Diffing with Ghidra's BSim Feature (Malware Analysis)

Binary Diffing with Ghidra's BSim Feature (Malware Analysis)

Protocol Reverse Engineering

Protocol Reverse Engineering

The Static File Analysis Tools I Trust for Malware Analysis

The Static File Analysis Tools I Trust for Malware Analysis

База по Базам Данных - Storage (Индексы, Paging, LSM, B+-Tree, R-Tree) | Влад Тен Систем Дизайн

База по Базам Данных - Storage (Индексы, Paging, LSM, B+-Tree, R-Tree) | Влад Тен Систем Дизайн

Malware Analysis with capa & Binary Ninja Plugins (API Hashing)

Malware Analysis with capa & Binary Ninja Plugins (API Hashing)

Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra

Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra

Авторизация и аутентификация | Глубокая теория 2025

Авторизация и аутентификация | Глубокая теория 2025

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]