LIVE: How to Get Started with Malware Analysis and Reverse Engineering!

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024

Комментарии • 22

  • @jaygillund4732
    @jaygillund4732 2 года назад +3

    This was a great video to introduce me to malware analysis. I am very thankful you recorded it, as I was unable to attend live. I look forward for your next video! Thank you sir!

    • @jstrosch
      @jstrosch  2 года назад

      Glad it was helpful! I'm certainly planning on more sessions in the future :)

  • @Hotmustardgas20
    @Hotmustardgas20 2 года назад +3

    I would love to see more Malware Analysis and RE videos! Great presentation also!

    • @jstrosch
      @jstrosch  2 года назад

      Absolutely, will be announcing the next live session this week! Going to look at getting started with malicious office documents :)

  • @chrisbolar2880
    @chrisbolar2880 2 года назад +1

    Thank you for creating regular content Dr Stroschein, I appreciate the depth and quality. I'd love to pay your team a visit once I've finished my degrees with SANS Institute.

    • @jstrosch
      @jstrosch  2 года назад

      Thank you for the feedback! I'm a one man band for now... but happy to chat any time :)

  • @fatihakbas8529
    @fatihakbas8529 6 месяцев назад +1

    Thank you for your time. I enjoyed this content! I am excited about learning more!

    • @jstrosch
      @jstrosch  6 месяцев назад

      That's great to hear!

  • @ReleaseTheKraken25
    @ReleaseTheKraken25 7 месяцев назад +1

    Super helpful, very much appreciated. Thanks for taking the time to put this together.

    • @jstrosch
      @jstrosch  7 месяцев назад

      Glad it was helpful and thank you for letting me know!

  • @christiangualteros36
    @christiangualteros36 2 года назад

    Thank you. This is a amazing work and hard to find out. Thank you for share your knowledge I appreciated so much your effort

    • @jstrosch
      @jstrosch  2 года назад

      Really glad to hear it was helpful, thank you for the feedback!

  • @mahidharpamujula2738
    @mahidharpamujula2738 2 года назад

    I would love to see more malware analysis especially RE I have been doing malware analysis for quite some time and just started RE

    • @jstrosch
      @jstrosch  Год назад

      I'll be posting a lot more videos this year - curious to hear if they are what you had in mind. Let me know!

  • @dtm7743
    @dtm7743 2 года назад

    I love the amazing work u put up here

    • @jstrosch
      @jstrosch  2 года назад

      Really glad to hear you enjoyed it, thank you for the feedback!

  • @christiangualteros36
    @christiangualteros36 2 года назад

    hello Josh. in your experience what is better Scylla o Cassandra in cybersecurity, both are important but my time is lacking and I want to harness it. Thank you again for everything you are the best master that I know

    • @jstrosch
      @jstrosch  2 года назад

      Hi! Scylla generally works quite well for me every time I use it and is also integrated into x32/64dbg. I'm not familiar with Cassandra though... could you provide a link? Of course, there are projects out there that go by the name Cassandra as well as Scylla that have nothing to do with malware analysis, I'm referring to the tool used for import reconstruction (often during malware unpacking) -> hxxps://github[.]com/NtQuery/Scylla

  • @ashitdutta6514
    @ashitdutta6514 2 года назад +1

    Professor, Many Many Thanks for the video. I have a quick question , how do convert a .exe file to an ole file ( for example .exe to .bin )

    • @jstrosch
      @jstrosch  2 года назад

      Hi! There really is no conversion there, just simply changing the file extension. You'll often see folks that work with and/or share malicious artifacts change the file extension to something that an operating system wouldn't recognize, in the case that you accidentally execute it (such as through a double-click).

  • @decoder6878
    @decoder6878 2 года назад

    Nice video.