Finding Evil with YARA

Поделиться
HTML-код
  • Опубликовано: 25 дек 2024

Комментарии • 17

  • @jeliazkozlatev3940
    @jeliazkozlatev3940 4 года назад +2

    ok what about ports ? can i check which process or library tries to use a port with yara rule?

    • @13Cubed
      @13Cubed  4 года назад +1

      Yes - check the documentation here: yara.readthedocs.io/_/downloads/en/stable/pdf/. Look at page 52.

  • @austintylerpike
    @austintylerpike 4 года назад +2

    Great intro vid to yara.

  • @dpsss100
    @dpsss100 3 года назад +1

    Love the video and a great fan of your work! Maybe it's a stupid question, but I don't understand the importance of the "wide" modifier. Why do we want to search for 2-bytes ASCII strings? For an IPv4 address, wouldn't 1 byte ASCII be enough? or am I understanding something wrong?

    • @13Cubed
      @13Cubed  3 года назад +2

      I would assume it is a result of the dotted decimal notation (not just the 8-bit value for each octet, but the literal dots/periods as well), but to be honest I am not certain. This is the standard convention I've always seen used.

  • @abhaypratap5311
    @abhaypratap5311 5 лет назад

    I want to make Yara rules filter for domain typosquatting and idn homograph attack ...how 2 do ..if u have suggestions PL tell me

  • @arunrawat5476
    @arunrawat5476 4 года назад

    Someone told me that ""Yara rules can also be used to convert a big data set in the form of clusters in machine learning " and it has a different use at different platforms. Is it true?

  • @Leokhawarizmi
    @Leokhawarizmi 2 года назад +1

    Please make more videos about malware analysis

    • @13Cubed
      @13Cubed  2 года назад +1

      Appreciate the feedback -- I'm not an RE, but I will consider any other content of this type that I could share that might be of value to the community.

    • @Leokhawarizmi
      @Leokhawarizmi 2 года назад +1

      @@13Cubed
      Can't wait to see your next awesome lectures

  • @desheen5056
    @desheen5056 5 лет назад

    Well Explained, thank you very much of your effort, yara is used in IDS system ? right ?

    • @13Cubed
      @13Cubed  5 лет назад

      Thanks, and yes, many IDS/IPS's support YARA rules.

  • @kyaw-pyiythtet431
    @kyaw-pyiythtet431 5 лет назад

    Thank you for YARA video!!!!! May i hope RE on malware video from you?

  • @jelluh24
    @jelluh24 5 лет назад

    Do virusscanners use the same technique? Is yara better?

    • @13Cubed
      @13Cubed  5 лет назад +1

      Some AV products and endpoint security solutions (including application whitelisting products like Carbon Black) can use YARA rules as part of their scanning engines. However, YARA is an independent tool and provides a simple and efficient way of writing your own rules. It is very useful for malware research, or for rolling your own search logic. So they are related, but one is not better than the other.

    • @eatmypewpewz
      @eatmypewpewz 5 лет назад +1

      Yara is open source, and facilitates the sharing of signatures as opposed to commercial virus signatures. It also has applications for categorizing similar malware by family based on code overlap and can be used to search services like VirusTotal for related samples.

  • @加藤チャンネル-k3v
    @加藤チャンネル-k3v 5 лет назад

    Yaraないか