Memory Dump Unpacking - Finding Redline Stealer

Поділитися
Вставка
  • Опубліковано 14 січ 2025

КОМЕНТАРІ • 12

  • @DEF3NDME
    @DEF3NDME Рік тому +2

    I liked the idea of pivotting between IOCs from Threat intellegnce reports to get what you missed from that unreashable endpoint.

  • @rajnepali1660
    @rajnepali1660 Рік тому

    This is awesome. Thanks for sharing Josh

    • @jstrosch
      @jstrosch  Рік тому

      Glad to hear - you're very welcome!

  • @TheRaghav12345678910
    @TheRaghav12345678910 6 місяців тому +1

    Thanks!

  • @rizwanmehboob4725
    @rizwanmehboob4725 Рік тому +1

    Great content, thanks for sharing Josh. I just wanted to know how you determined the raw size when making the raw address same as virtual address ?

    • @jstrosch
      @jstrosch  Рік тому

      Hi! I just used the virtual size - assuming that size should match up since we are working with the process image. I haven't used this technique extensively so there could be plenty of issues, but for the most part it seems to work well :) Let me know if this helps.

  • @MonstrMash123458943
    @MonstrMash123458943 Рік тому

    This is so cool i was wondering could you make a video on rebuilding a virtual function table with ghidra

    • @jstrosch
      @jstrosch  Рік тому

      I’ve added it to my list of topics :) Thanks for the suggestion.

  • @duckie4670
    @duckie4670 Рік тому

    great content :D