btfox

Malware Analysis- Identifying and Defeating Code Obfuscation

File list

  • 05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.mp4-28.32 MB
  • 06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.mp4-25.98 MB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.mp4-25.92 MB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.mp4-25.07 MB
  • 06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.mp4-24.89 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).mp4-23.77 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.mp4-22.14 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.mp4-20.81 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.mp4-19.38 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.mp4-19.34 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.mp4-18.95 MB
  • 06. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.mp4-14.82 MB
  • 02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.mp4-14.26 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.mp4-10.78 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.mp4-7.98 MB
  • 06. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.mp4-6.91 MB
  • 02. How Obfuscation Affects Your Analysis/04. What You Should Know.mp4-6.43 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.mp4-6.04 MB
  • 02. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.mp4-5.05 MB
  • 01. Course Overview/01. Course Overview.mp4-4.18 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Obfuscation in PowerShell.mp4-4.13 MB
  • 07. Leveling up Your Skills/02. What You Learned.mp4-3.44 MB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/02. Constructing an Import Table.mp4-2.85 MB
  • 07. Leveling up Your Skills/03. Leveling up Your Skills.mp4-2.13 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/08. Conclusion.mp4-1.99 MB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/01. Module Introduction.mp4-1.5 MB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Module Introduction.mp4-1.37 MB
  • 02. How Obfuscation Affects Your Analysis/01. Module Introduction.mp4-1.28 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/06. Conclusion.mp4-1.09 MB
  • 04. Detecting and Defeating String Obfuscation in Native Code/01. Module Introduction.mp4-1.03 MB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/06. Conclusion.mp4-1.03 MB
  • 06. Identifying Malware Use of Cryptography/06. Conclusion.mp4-1.02 MB
  • 02. How Obfuscation Affects Your Analysis/05. Conclusion.mp4-1.02 MB
  • 06. Identifying Malware Use of Cryptography/01. Module Introduction.mp4-1.01 MB
  • malware-analysis-identifying-defeating-obfuscation.zip-680.35 KB
  • 07. Leveling up Your Skills/01. Module Introduction.mp4-546.91 KB
  • 07. Leveling up Your Skills/04. Conclusion.mp4-408.64 KB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.srt-14.94 KB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).srt-14.71 KB
  • 04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.srt-14.63 KB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.srt-14.58 KB
  • 06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.srt-14.33 KB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.srt-14.22 KB
  • 05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.srt-12.88 KB
  • 06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.srt-12.64 KB
  • 04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.srt-12.36 KB
  • 02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.srt-12.32 KB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.srt-11.62 KB
  • 03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.srt-11.31 KB
  • 04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.srt-9.48 KB