Malware Analysis- Identifying and Defeating Code Obfuscation
File List
- 05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.mp4 28.3 MB
- 06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.mp4 26.0 MB
- 05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.mp4 25.9 MB
- 05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.mp4 25.1 MB
- 06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.mp4 24.9 MB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).mp4 23.8 MB
- 04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.mp4 22.1 MB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.mp4 20.8 MB
- 04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.mp4 19.4 MB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.mp4 19.3 MB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.mp4 18.9 MB
- 06. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.mp4 14.8 MB
- 02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.mp4 14.3 MB
- 04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.mp4 10.8 MB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.mp4 8.0 MB
- 06. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.mp4 6.9 MB
- 02. How Obfuscation Affects Your Analysis/04. What You Should Know.mp4 6.4 MB
- 04. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.mp4 6.0 MB
- 02. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.mp4 5.1 MB
- 01. Course Overview/01. Course Overview.mp4 4.2 MB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Obfuscation in PowerShell.mp4 4.1 MB
- 07. Leveling up Your Skills/02. What You Learned.mp4 3.4 MB
- 05. Detecting and Defeating Function Obfuscation in Native Code/02. Constructing an Import Table.mp4 2.9 MB
- 07. Leveling up Your Skills/03. Leveling up Your Skills.mp4 2.1 MB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/08. Conclusion.mp4 2.0 MB
- 05. Detecting and Defeating Function Obfuscation in Native Code/01. Module Introduction.mp4 1.5 MB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Module Introduction.mp4 1.4 MB
- 02. How Obfuscation Affects Your Analysis/01. Module Introduction.mp4 1.3 MB
- 04. Detecting and Defeating String Obfuscation in Native Code/06. Conclusion.mp4 1.1 MB
- 04. Detecting and Defeating String Obfuscation in Native Code/01. Module Introduction.mp4 1.0 MB
- 05. Detecting and Defeating Function Obfuscation in Native Code/06. Conclusion.mp4 1.0 MB
- 06. Identifying Malware Use of Cryptography/06. Conclusion.mp4 1.0 MB
- 02. How Obfuscation Affects Your Analysis/05. Conclusion.mp4 1.0 MB
- 06. Identifying Malware Use of Cryptography/01. Module Introduction.mp4 1.0 MB
- malware-analysis-identifying-defeating-obfuscation.zip 680.3 KB
- 07. Leveling up Your Skills/01. Module Introduction.mp4 546.9 KB
- 07. Leveling up Your Skills/04. Conclusion.mp4 408.6 KB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.srt 14.9 KB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).srt 14.7 KB
- 04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.srt 14.6 KB
- 05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.srt 14.6 KB
- 06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.srt 14.3 KB
- 05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.srt 14.2 KB
- 05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.srt 12.9 KB
- 06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.srt 12.6 KB
- 04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.srt 12.4 KB
- 02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.srt 12.3 KB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.srt 11.6 KB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.srt 11.3 KB
- 04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.srt 9.5 KB
- 06. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.srt 8.1 KB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.srt 7.2 KB
- 06. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.srt 7.2 KB
- 04. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.srt 6.2 KB
- 02. How Obfuscation Affects Your Analysis/04. What You Should Know.srt 6.1 KB
- 02. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.srt 5.1 KB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Obfuscation in PowerShell.srt 4.0 KB
- 07. Leveling up Your Skills/02. What You Learned.srt 3.6 KB
- 01. Course Overview/01. Course Overview.srt 3.4 KB
- 05. Detecting and Defeating Function Obfuscation in Native Code/02. Constructing an Import Table.srt 2.8 KB
- 07. Leveling up Your Skills/03. Leveling up Your Skills.srt 2.6 KB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/08. Conclusion.srt 2.4 KB
- 05. Detecting and Defeating Function Obfuscation in Native Code/01. Module Introduction.srt 1.5 KB
- 03. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Module Introduction.srt 1.4 KB
- 04. Detecting and Defeating String Obfuscation in Native Code/06. Conclusion.srt 1.4 KB
- 02. How Obfuscation Affects Your Analysis/01. Module Introduction.srt 1.4 KB
- 02. How Obfuscation Affects Your Analysis/05. Conclusion.srt 1.3 KB
- 06. Identifying Malware Use of Cryptography/06. Conclusion.srt 1.2 KB
- 05. Detecting and Defeating Function Obfuscation in Native Code/06. Conclusion.srt 1.1 KB
- 04. Detecting and Defeating String Obfuscation in Native Code/01. Module Introduction.srt 1019 bytes
- 06. Identifying Malware Use of Cryptography/01. Module Introduction.srt 967 bytes
- 07. Leveling up Your Skills/01. Module Introduction.srt 700 bytes
- 07. Leveling up Your Skills/04. Conclusion.srt 554 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.