Тёмный
dist67
dist67
dist67
Подписаться
My videos.
blog.DidierStevens.com
DidierStevensLabs.com
PNG + mimikatz.exe
7:29
Год назад
PNG Analysis
5:32
Год назад
Grep & Tail -f With Notepad++
2:59
Год назад
An Obfuscated Beacon - Extra XOR Layer
15:16
2 года назад
VBA Maldoc & UTF7 (APT-C-35)
20:06
2 года назад
James Webb JPEG With Malware
14:43
2 года назад
1768.py's Sanity Check
5:32
2 года назад
Maldoc: non-ASCII VBA Identifiers
9:31
2 года назад
Another Exercise In Encoding Reversing
24:56
2 года назад
Maldoc .DOCX MSDT Inside Sandbox
1:18
2 года назад
Method For String Extraction Filtering
10:33
2 года назад
curl, json & jo
5:43
2 года назад
Maldoc Cleaned by Anti-Virus
18:46
2 года назад
TShark & Multiple IP Addresses
6:44
2 года назад
YARA's Console Module
3:49
2 года назад
MSBuild & Cobalt Strike
8:02
2 года назад
YARA Rules for Office Maldocs
15:16
2 года назад
Obfuscated Maldoc: Reversed BASE64
10:30
2 года назад
Комментарии
@ParthGupta-my9ox
@ParthGupta-my9ox 3 месяца назад
Big fan of you sir🫡 I’ve been studying your tools closely. Love your work❤️
@xDx4444
@xDx4444 3 месяца назад
Thanks for another great video, Mr. Stevens.
@eduardoreta6893
@eduardoreta6893 3 месяца назад
Awesome video! Hope you post content more often, it's amazing!!!
@nuovoaccount998
@nuovoaccount998 3 месяца назад
Welcome back
@googleadmin4749
@googleadmin4749 3 месяца назад
Thanks
@CaptainSlowbeard
@CaptainSlowbeard Год назад
Don't know if it might help anyone, but here is a summary of each videos contents: 1 - Set up lab 2.1 - analysis of exercise 1 file, anatomy of a pdf 3.2 - open example pdf file and view filters in vim, pdfid, pdf-parser 4.3 - obfuscated data hidden in streams via filters: ASCIIHexDecode /Flatedecode 5.4 - JS/Javascript objects. pdf-parser search option -s 6.4-5 - non-triggered javascript 7.5 - OpenAction object to trigger Javascript on open 8.6 - Name-obfuscated javascript 9.7 - Analysing obfuscated javascript with patched Spidermonkey JS parser 10.8 - More JS analysis. Obfuscation with app viewerVersion property 11.9 - JS obfuscation using /FlateDecode and annotations using .getAnnots() 12.10 - Obfuscation using Objstm object streams (NOT stream objects) 13.11 - real exploits(1): using JS and OpenAction 14.11 - real exploits(1): continued, seeing previous exploit in action with debugger 15.12 - real exploits(2): Using JS and OpenAction, unescape and unicode shellcode payload 16.12 - real exploits(2): continued, seeing previous exploit in action with debugger 17.13 - malicious /EmbeddedFile. /FileSpec 18.14 - malicious embedded files via appending to end of file. -e switch, extended info. Entropy. -x switch, extract bytes 19.15 - malicious embedded files via /AcroForm and XML 20.16 - older exploits(1) obfuscated XML bomb using entities in DOCTYPE hidden in this.metadata 21.17 - older exploits(2) phishing by setting isFullScreen 22.18 - older exploits(3) abusing launch action to run arbitrary code 23.18 - older exploits(3) continued: analysing previous exploit 24.19 - encrypted pdf exploits(1): non-password encrypted pdfs, encrypted JS tags, qpdf tool 25.20 - encrypted pdf exploits(2): password encrypted pdfs, hidden object contents
@kanishq1000
@kanishq1000 Год назад
Great Analysis
@naimulislam1263
@naimulislam1263 Год назад
Damn man! That's a piece of gold. Thanks.
@petr_s_ekata
@petr_s_ekata Год назад
31337 Thank you a lot, Didier!
@garyrowe58
@garyrowe58 Год назад
Many thanks for de-mystifying this!
@kotreq5862
@kotreq5862 Год назад
Hi, i really like your videos! I have seen one of your older videos about vbe files. I have searched for a very long time to find this information, do you have any references to the vbe file format? I would be very grateful
@dist67
@dist67 Год назад
No, I don't. I don't think there's official public documentation from Microsoft for this.
@dist67
@dist67 Год назад
Take a look at the source code, there's a URL
@spyghetti
@spyghetti Год назад
Keep it up, this is underrated as we all have probably 20+ cables we use for multiple devices micro, mini, USB C , A .. it's a great way to test and toss all the older or garbage cables we hang onto to. I have the older version of that tester without USB C.. I'm going to try this. super helpful
@Giscardyoryor
@Giscardyoryor Год назад
This is awesome.
@Lucas01legend
@Lucas01legend Год назад
I got PDF where stream objects contain even more stream objects inside, when I pipe -O to | pdfid it shows many more strobj included in the output of original stream objects. Was there an update? Has this changed and how can I investigate. If I pass it again to pdfid (as you expected) it fails
@dist67
@dist67 Год назад
You no longer have to use pdfid more than once now. Just use pdf-parser.py -O -a sample.pdf
@sarthak913
@sarthak913 Год назад
😂😂 tribute lol
@sarthak913
@sarthak913 Год назад
This is helpful. Thanks
@xDx4444
@xDx4444 Год назад
Mr. Stevens, thank you very much for sharing your knowledge with us :)
@blackboy424
@blackboy424 Год назад
This helps newcomers so much with impostor syndrome thanks so much for sharing this!
@digitallova
@digitallova Год назад
Oh lalalala le tribute de fou , merci didier aussi
@memedaddyz
@memedaddyz Год назад
OMFG
@gaborkovacs9881
@gaborkovacs9881 Год назад
Thanks for the video, that was super!
@weaintdointhis
@weaintdointhis Год назад
I've been watching your videos for some time, learning slowly. This is the first time I was able to comprehend the whole thing! Thank you
@andypuma6732
@andypuma6732 2 года назад
thx for this tip 👍
@ThomasWallutis
@ThomasWallutis 2 года назад
Nice, especiailly tail -f
@nilanjana25
@nilanjana25 2 года назад
This was very helpful. Thank you Didier!
@weaintdointhis
@weaintdointhis 2 года назад
Great video idea
@rickhenderson5527
@rickhenderson5527 2 года назад
Another very useful example! Thanks!
@hannahprobably5765
@hannahprobably5765 2 года назад
Huge thanks sir!
@ravikumar-ch3hs
@ravikumar-ch3hs 2 года назад
WOW, the famous internet strok center has a youtube channel? I am thankful for the free content you have been posting regularly sir. Sir can you make a video describing how college grads/students and high school student can get into information security? maybe a roadmap?
@dist67
@dist67 2 года назад
This is my (Didier Stevens) RU-vid channel, this is not the RU-vid channel of the SANS Internet Storm Center. I'm an SANS ISC handler, but this is my channel. The SANS ISC channel is here: ru-vid.com Best that you post your comment there.
@ravikumar-ch3hs
@ravikumar-ch3hs 2 года назад
@@dist67 okay sir, but after watching couple of videos on malware analysis and after doing some quick google search about you, I think if would be great if you can give some advice/path to younger generations who want to start into this feild. I came across your RE blog but I don't have pre-requisite knowledge to follow along. I would be grateful to you sir and willing to learn from your experience.
@dist67
@dist67 2 года назад
I gave that advice about a year ago at a SANS Summit: www.sans.org/presentations/purple-vitamins-to-grow-your-skills/
@ravikumar-ch3hs
@ravikumar-ch3hs 2 года назад
@@dist67 Thanks a lot sir. Your talk was quite helpful to start .
@malwareanalysis79
@malwareanalysis79 2 года назад
Can i get hex-to-bin.py file
@dist67
@dist67 2 года назад
I always post a link in the description, where you can find all the information. Unfortunately, this time I included the wrong link. Please follow the updated link.
@rickhenderson5527
@rickhenderson5527 2 года назад
Wow. Again. I wish my brain worked like yours. There is still so much to learn!
@liquidpod
@liquidpod 2 года назад
Thanks, very informative!
@angryman9333
@angryman9333 2 года назад
Appreciate the informative video
@nuszkat9953
@nuszkat9953 2 года назад
Thanks so much for the analysis and overview
@Br0kensaint1
@Br0kensaint1 2 года назад
Great content keep it up
@hannahprobably5765
@hannahprobably5765 2 года назад
thank you sir
@akhil.b4017
@akhil.b4017 2 года назад
Hello sir, Why it's called dictionary ?
@dist67
@dist67 2 года назад
That's the official name in the PDF reference documentation.
@ibrahimmuhammad5414
@ibrahimmuhammad5414 2 года назад
Please Sir I want to use your tools on windows
@dist67
@dist67 2 года назад
My Python tools work on all OS that support the installation of Python. Windows too.
@rickhenderson5527
@rickhenderson5527 2 года назад
I'm so glad this is still here!
@angryman9333
@angryman9333 2 года назад
thanks
@hannahprobably5765
@hannahprobably5765 2 года назад
<3 Full love and thank you sir
@guillermogaleanofernandez5497
@guillermogaleanofernandez5497 2 года назад
Great!
@cobrew2003
@cobrew2003 2 года назад
Can you share dnsresolver.py please? Thanks
@dist67
@dist67 2 года назад
I published dnsresolver almost a year ago. I even have YT videos covering all the features & a playlist: ru-vid.com/group/PLa-ohdLO29_augQDv73OI37aIHZkrr5h6
@weaintdointhis
@weaintdointhis 2 года назад
Can you host a harmless example/test file of this we can download?
@dist67
@dist67 2 года назад
Take a look here: gist.github.com/tothi/66290a42896a97920055e50128c9f040
@digitallova
@digitallova 2 года назад
What else ???!!! Hahaha just love it
@the-don984
@the-don984 2 года назад
Where i can find this script?
@dist67
@dist67 2 года назад
Take a look here: gist.github.com/tothi/66290a42896a97920055e50128c9f040
@donaldduck6198
@donaldduck6198 2 года назад
How can BumbleBee include Excel4Macro and VBA in a xlsx?
@dist67
@dist67 2 года назад
Which sample?
@andypuma6732
@andypuma6732 2 года назад
no voice??
@dist67
@dist67 2 года назад
Indeed, quick recording away from home, no voice.
@rickhenderson5527
@rickhenderson5527 2 года назад
This is so useful, thanks for all your work Mr. Stevens.