Myvideo

Guest

Login

Malware Theory - Unpacking Approaches and Methods

Uploaded By: Myvideo
1 view
0
0 votes
0

An overview to unpacking methods, when to apply them and what generic approach to use for unpacking malware. Malware Course: Follow me on Twitter: infographics: Environments/Infographics/ Additional resources: - Packer identification: - Virtualization based obfuscation: - Skim for obvious XOR encryption: - Run and Dump with PE-Sieve: - Debugging and Breakpoints - Agniane Stealer: - Memory Mapping: - Dumpulator: - Self-Extracting Patch:

Share with your friends

Link:

Embed:

Video Size:

Custom size:

x

Add to Playlist:

Favorites
My Playlist
Watch Later