ADVANCED Malware Analysis | Reverse Engineering | Decompiling Disassembling & Debugging (PART 1)
Вставка
- Опубліковано 30 вер 2024
- Are you new to cyber security and want to see if it's the right job for you? Try out the Google Cybersecurity Certificate: imp.i384100.ne...
Patreon if you wanna click stuff:
/ madhatistaken
Welcome to Mad Hat. I'm a Cyber Security Analyst at an undisclosed Fortune 500 company. Here, we talk about tips and tricks on how to land a successful career in tech. If you are interested, make sure to hit that subscribe button!
Cybersecurity Certification Study Resources
CISSP Study Guide - amzn.to/3LmjOLM
CISSP Practice Tests - amzn.to/3oreDRO
Security+ Study Guide - amzn.to/3mTGPwg
A+ Study Guide - amzn.to/3KWS27n
Check Out My Setup
Gaming Chair - amzn.to/3V0nAhg
Monitors - amzn.to/3L1DVgT
Mouse - amzn.to/3H6A5Su
Keyboard - amzn.to/3mNXLVa
Microphone - amzn.to/40BQPId
Camera - amzn.to/41BqwmX
Disclaimer: Some links are affiliate links.
#malwareanalysis #cybersecurity #education
Apparently, I'm having imposter syndrome .
One of my favorite topic when it comes to cyber sec. Thanks for all the info and keep up the good work! Can't wait for part 2 :D
I was just thinking this would be badass to watch someone do this lets gooooooo
The only thing I understood was that I have a lot more to learn and also that this is gold tier content and I must level up and come back when I can understand the verbiage and processes being discussed.
It is truly confusing. At first. But it gets easier. I was taught C# from a cheat seller for video games, though not good considering he made his cheats in C++, trust me, it is not as confusing as it looks. It is imposing in sight, but in rules, it is not. It takes time.
I know it is going to be a nice vid. By the way, im gonna hack you, bro
Thanks for uploading more advanced content!
12:08 bro jacked 💪🏾
I got it right!!!!🎉
Boy is cookin up some sauce for us with these vids
Oh man I cant have enough of your videos!!!! absolutely the best. I wish Life had a FUN mod like with Your videos@@!!
Connecting it Russia would be HYPE as hell hahahhaha
C2 framework good joke hehe
I only knew DISASM via ASM for disassembling games to create things like nospread/noecoil and ect but more so bypassing anti-cheat systems. This is more interesting, honestly. inb4 the comedic genius of Mad Hat. Anyone in the comment section who used ASM or reverse engineering knows the video looks familiar around 3:46
@mad hat
what is the best cyber security aspect that reduces the need for coding? I am not a coder, do not want to be, so is this avoidable in CS? Thanks.
I used to use hex editors to check for API calls/hooks like WSOCK32 and keylogging functions before running a file. Can confirm. Packers changed this, but are reversible sometimes.
To be honest this too much for me, I reside in networking, not all this code stuff. But I love your videos anyways.
crawl
walk
run
sprint
fly
go to space (you are here)
Nice moustache
@@duskb1t thank you friendo
Fake name, real 'stache.
Awesome video! 8:00 - what is the link to find the commonly used windows API by malwares?
Mad Hat you are so epic!
I am L1 Security Analyst. Which Course would you recommend me for the future?
first thing i did was fire up ida pro and not cheap ASS ghidra💀 still very informative and great video❤
oh shit mad hat is doin some crazy stuff, idk what is going on but I do know my brain likes it
Dawg for the love of god enable Dark Mode lmao
Great video and stellar outro. I need to go back and watch the basic video again.
Yes I like dragon energy drink!!
Awesome so cool liked and subscribed
Will a security clearance benefit me if working in the private sector and not government contracted?
Probably not, since the whole purpose of the security clearance is for compliance purposes - as in who's allowed to work with the data/access.
Did your compiler output a pdb? I recommend deleting or renaming the pdb, in the future, as Ghidra will check the pdb path that is in the PE, and automatically apply it when you analyze.
Of course, you won't have a pdb when analyzing malware in the wild.
Well, very likely you won't. Accidents probably happen. There are some dumb malware devs.
Oh yea, I think it also checks the folder the exe is in. And maybe some others. So many times I tried to analyize without pdb symbols, and they accidentally showed up. Lol.
When pt2 mate can't wait!!
Love that little gold chain haha
Thanks man
Awesomeeeee!!!
whats your niche boss?
Blue teaming atm, IR and a good bit of threat detection.
.0.
This guy is gonna be big.
cooler than I thought