PANDA: Reverse engineering with record and replay.

Поделиться
HTML-код
  • Опубликовано: 15 ноя 2024

Комментарии • 7

  • @adalogics7389
    @adalogics7389  3 года назад +2

    This was not highlighted in the video, but it's important to emphasize what technically occurred here in order to really appreciate why this is cool. We recorded the execution of a full Windows OS and then extracted all of the processes on the system as well as information about the dynamically loaded modules. We did this without deploying any code in the target Windows OS, meaning that all of the information was derived by interpreting the state of the guest system based on it's hardware. So the analysis was performed "outside-the-box".

  • @eduardschreder1623
    @eduardschreder1623 3 года назад +1

    nice video, i hope we can see more advanced use cases too. i think a video about taint/tracer would be intersting!

  • @karlmartell895
    @karlmartell895 3 года назад +1

    Hi, i'm at 9:38. panda-system-i386 starts a vnc server although i've done the same steps and commands you did. How do i get a gui in order interact with the emulated system as you have? Thank you

    • @karlmartell895
      @karlmartell895 3 года назад

      Ok, i've connected to the vnc server via xtightvncviewer. What is the gui you are using and that pops up automatically as seen in your video?

  • @koeningyou
    @koeningyou 3 года назад

    Thank you for the informative video.

  • @brhvitor4
    @brhvitor4 3 года назад

    Awesome video. Thanks

  • @dayouzhang8233
    @dayouzhang8233 3 года назад

    I got "No bootable device" when I try to run panda-re on ubuntu20.04, would you help me out?