Тёмный

The Black Magicks of Malware: Function Call Obfuscation 

Alh4zr3d
Подписаться 12 тыс.
Просмотров 2 тыс.
50% 1

Опубликовано:

 

23 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 19   
@businkabasima5645
@businkabasima5645 6 месяцев назад
Hey All, just wanted to drop by and say thank you for everything you do! I've been watching your streams, VODs, and videos for the past year, soaking in your advice and recommendations. As a result, I landed my first job offer and joined a great company! Wishing you all the best, and once again, thank you!
@nuxar8778
@nuxar8778 8 месяцев назад
I’ve only tested it for kernel mode imports but it should be possible either way. The only hard thing is finding the base address of the DLL you’re looking for (because of ASLR). Most should be automatically loaded so you should be able to get it by iterating the loaded modules list from the PEB. (gs:60 iirc)
@b.h.5950
@b.h.5950 8 месяцев назад
🎉🎉🎉 behold, he is back on yt!! Glad to see you again!
@DarkDonnieMarco
@DarkDonnieMarco 8 месяцев назад
Awesome to see you back bud. Currently working through OSEP, so this is well timed.
@alh4zr3d3
@alh4zr3d3 8 месяцев назад
This should definitely help you out!
@DarkDonnieMarco
@DarkDonnieMarco 8 месяцев назад
@@alh4zr3d3 I am absolutely loving OSEP, the course structure and teaching materials are light years ahead of the random mess of topics Offsec teach at OSCP.
@russellbrinson3140
@russellbrinson3140 8 месяцев назад
Great to see series coming back!
@peterclark5244
@peterclark5244 8 месяцев назад
Doing WinAPI function calls in my reverse engineering class right now, this was super helpful!
@0x3ye0n
@0x3ye0n 8 месяцев назад
Awesome explanation I will definitely need to play around with this and see if I can find anything. Thanks for the content!
@ThaLiquidEdit
@ThaLiquidEdit 8 месяцев назад
Appreciate that you are back!
@theo6580
@theo6580 8 месяцев назад
spectacular! I'm a little thin on coding experience so I appreciate the boilerplate code. Thank you Al!
@GuitarGuy__
@GuitarGuy__ 8 месяцев назад
Dude your content is pure gold!!!
@neotokyo98
@neotokyo98 8 месяцев назад
welcome back to youtube
@comosaycomosah
@comosaycomosah 8 месяцев назад
Ayyye new video!
@Macj707
@Macj707 8 месяцев назад
CHEF CRISP WUZ HERE!
@itstimetostop5758
@itstimetostop5758 8 месяцев назад
nice vid!
@lumikarhu
@lumikarhu 8 месяцев назад
no, throwing a meterpreter instead of calc will not work as well, especially with C# and an EDR on board. it will probably get flagged before you get to launch it
@alh4zr3d3
@alh4zr3d3 8 месяцев назад
This calc shellcode would also get flagged. As I say in the video, I kept the code as boilerplate as possible to make it simple and to focus on the technique. How would you fix it? Make it so the shellcode doesn't pop AV.
Далее
Advent of Cyber 2022 Day 9: Pivoting
1:15:42
Просмотров 25 тыс.
iPhone Flip станет ХИТОМ!
00:40
Просмотров 99 тыс.
The Rise of Unix. The Seeds of its Fall.
16:51
Просмотров 496 тыс.
The Magic Of ARM w/ Casey Muratori
1:25:01
Просмотров 102 тыс.
JScript Deobfuscation - More WSHRAT (Malware Analysis)
1:02:01
How A Steam Bug Deleted Someone’s Entire PC
11:49
How Math Becomes Difficult
39:19
Просмотров 91 тыс.
the TRUTH about C++ (is it worth your time?)
3:17
Просмотров 733 тыс.
This malware will ENCRYPT your files!
38:06
Просмотров 1,4 тыс.
98% Cloud Cost Saved By Writing Our Own Database
21:45
Просмотров 392 тыс.