Malware Analysis Bootcamp - File Type Identification

Поделиться
HTML-код
  • Опубликовано: 27 авг 2024
  • Welcome to the Malware Analysis Bootcamp. We will be covering everything you need to know to get started in Malware Analysis professionally. In this video, we will be taking a look at file type identification, why it is important and the tools we will be using.
    Link to slides: docs.google.co...
    Malware Sample: s3.eu-central-...
    Tools & links used in the video:
    Windows VM's: developer.micr...
    Fireye installation guide: www.fireeye.co...
    Github Repository: github.com/fir...
    ◼️Get Our Courses:
    Python For Ethical Hacking: www.udemy.com/...
    Ethical Hacking Bootcamp: www.udemy.com/...
    ◼️Our Platforms:
    Blog: hsploit.com/
    HackerSploit Forum: hackersploit.org/
    HackerSploit Cybersecurity Services: hackersploit.io
    HackerSploit Academy: www.hackersplo...
    HackerSploit Discord: / discord
    HackerSploit Podcast: / hackersploit
    iTunes: itunes.apple.c...
    ◼️Support us by using the following links:
    NordVPN: nordvpn.org/ha...
    Patreon: / hackersploit
    I hope you enjoy/enjoyed the video.
    If you have any questions or suggestions feel free to post them in the comments section or on my social networks.
    Social Networks - Connect With Us!
    -------------------------------
    Facebook: / hackersploit
    Twitter: / hackersploit
    Instagram: / hackersploit
    Patreon: / hackersploit
    --------------------------------
    Thanks for watching!
    Благодаря за гледането
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    #MalwareAnalysis

Комментарии • 45

  • @m1k3thirteen81
    @m1k3thirteen81 2 года назад +7

    You are the David Attenborough of Cybersecurity! Can’t get enough! Thank you so much for what you do for the community!

    • @HackerSploit
      @HackerSploit  2 года назад

      That is greatly appreciated, I am glad you find value in the content.

  • @Naveenbabuborugadda
    @Naveenbabuborugadda Год назад

    This is the ratest video about Malware Analysis in RUclips

  • @sametsahin-eh3qj
    @sametsahin-eh3qj Год назад

    You sir are a genius. Huge respect.

  • @eswar5252
    @eswar5252 3 года назад

    Thanks You saved me a lot of time and drew me out of confusion of what to learn

  • @VipulVaibhaw
    @VipulVaibhaw 5 лет назад

    Watched it over minutely... thanks for this. :)

  • @cherubrock222
    @cherubrock222 5 лет назад

    Amazing series! You have a great way of explaining this stuff.

  • @ecliptic_at
    @ecliptic_at 2 месяца назад

    great video

  • @95Biswajit
    @95Biswajit 5 лет назад

    Loved it. :).. looking forward to get more in this series.

  • @Chris-ez1ly
    @Chris-ez1ly 3 года назад

    Great video. Thank you as always.

  • @KishorKumar-re2rs
    @KishorKumar-re2rs 6 месяцев назад

    Can you please explain what is the entry point and what are its uses?

  • @nikhilt3755
    @nikhilt3755 5 лет назад +3

    "this program cannot be run in DOS"
    this is located inside DOS stub
    if you are running on DOS this header is identified and gets executed
    else its skips this header
    last 16 bits in MZ header tells the address to the PE header
    (because DOS header gets skipped in windows 10)
    my old memories with malware analysis

    • @HackerSploit
      @HackerSploit  5 лет назад

      Yes, we have not yet covered headers yet. This will also be explained.

    • @nikhilt3755
      @nikhilt3755 5 лет назад

      @@HackerSploit ok bro
      i m just saying what i remembered
      its been long while i have learnt
      waiting for whole tuts

  • @hanial-hayyawi4578
    @hanial-hayyawi4578 Год назад

    Splendid video

  • @blade1551431
    @blade1551431 5 лет назад +2

    link for sample does not work for me

  • @heavenonearth8
    @heavenonearth8 Год назад

    Thank you.

  • @Wei-ji9ou
    @Wei-ji9ou 2 года назад +1

    Can malware activate without execute them ?

  • @christojojo6590
    @christojojo6590 9 месяцев назад

    Hi, if the cff explorer can find all the info about the file type, then what is the need for all other tools explained in the video(Hexeditor,exeinfo PE)

  • @amoghnath3330
    @amoghnath3330 5 лет назад

    Thanks waiting for this :)

  • @nitczi706
    @nitczi706 2 года назад

    I'm trying to download the Pestudio manually, but when i run it, it says "The version of this file is not compatible with the version of Windows you're running. Check your computer's system information to see whether you need an x86 (32-bit) or x64 (64-bit) version of the program, and then contact the software publisher."
    I tried to find another version to download but I have no success. What can i do? There's another program which could replace the PEstudio?

  • @puneetkulkarni2416
    @puneetkulkarni2416 3 года назад

    Hello Hackersploit!!! You think I should refer to the book Malware Analysis by Monappa KA?
    Which one did you refer?

  • @austinmurphy9074
    @austinmurphy9074 4 года назад

    doesn't host-only adapter allow guest to communicate with host? How is this safe?

  • @rayamoooooo685
    @rayamoooooo685 2 года назад

    thanks

  • @pavanteja2219
    @pavanteja2219 2 года назад

    The sample malware not PE right ?

  • @supratickdey7125
    @supratickdey7125 3 года назад

    then how to find file type for packed ones

  • @_nosma
    @_nosma 5 лет назад

    Cannot Download the sample, it gives me a 404 error page.

  • @timoteogarcia1581
    @timoteogarcia1581 5 лет назад

    What does MZ stand for?

  • @choudhary6964
    @choudhary6964 5 лет назад

    Is it cryptography?

  • @cyberi2009
    @cyberi2009 5 лет назад

    what about Hebrew in the thanks part

  • @theunforgiven2601
    @theunforgiven2601 3 года назад

    why it doesn't work for me?
    it keeps telling me that it cant open the file because if may contain viruses.
    when ever i drag the malware to the hex editor or any other program.
    please help x(
    note that it was working before, and all of sudden it didn't work again x( x(

    • @theunforgiven2601
      @theunforgiven2601 3 года назад

      @Nathan Jenkins i did.. but still the malware didn't open.
      However, i used linux. And it's working :p

    • @qwerty.760
      @qwerty.760 3 года назад +1

      @@theunforgiven2601 also dont run it on your main system. Use virtual box/vmware or another isolated system.

    • @theunforgiven2601
      @theunforgiven2601 3 года назад

      @@qwerty.760 Yep... thank you for the advice. i used VM for that :)

    • @bobnoob1467
      @bobnoob1467 2 года назад

      @@theunforgiven2601 even better, a sandbox environement.

  • @MayankBhardwaj-fy7ge
    @MayankBhardwaj-fy7ge Год назад

    😍😍😍😍😍😍

  • @SatyamKumar-ti6hw
    @SatyamKumar-ti6hw 5 лет назад

    The malware sample is no longer located in the Google drive. Error 404

  • @dylanzentz4525
    @dylanzentz4525 4 года назад

    where can i go to find malware? i just want the source code of viruses. Where can i find them?

    • @ProfChoy
      @ProfChoy 3 года назад

      Have you found them? I think GitHub has it

  • @B14CK.M4M84
    @B14CK.M4M84 5 лет назад

    ❤❤👍👍

  • @MisterK-YT
    @MisterK-YT Год назад

    Windows Vista? Lol