Magnetic link has been copied to the cutting board

Name Malware Analysis- Identifying and Defeating Code Obfuscation

File Type video

Size 357.74MB

UpdateDate 2024-11-8

hash *****292C8C27CF10796C039613CC10A18658F6

Hot 1480

Files 01. Course Overview/01. Course Overview.mp4 | 4.18MB 01. Course Overview/01. Course Overview.srt | 3.40KB 02. How Obfuscation Affects Your Analysis/01. Module Introduction.mp4 | 1.28MB 02. How Obfuscation Affects Your Analysis/01. Module Introduction.srt | 1.35KB 02. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.mp4 | 5.05MB 02. How Obfuscation Affects Your Analysis/02. Understanding Code Obfuscation.srt | 5.13KB 02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.mp4 | 14.26MB 02. How Obfuscation Affects Your Analysis/03. How Obfuscation Impacts Analysis.srt | 12.32KB 02. How Obfuscation Affects Your Analysis/04. What You Should Know.mp4 | 6.43MB 02. How Obfuscation Affects Your Analysis/04. What You Should Know.srt | 6.11KB 02. How Obfuscation Affects Your Analysis/05. Conclusion.mp4 | 1.02MB 02. How Obfuscation Affects Your Analysis/05. Conclusion.srt | 1.31KB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Module Introduction.mp4 | 1.37MB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/01. Module Introduction.srt | 1.44KB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.mp4 | 7.98MB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/02. Prevalent Obfuscation Techniques.srt | 7.20KB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).mp4 | 23.77MB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/03. Obfuscation in Visual Basic for Applications (VBA).srt | 14.71KB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.mp4 | 20.81MB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/04. Demo- Defeating VBA Obfuscation.srt | 14.94KB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Obfuscation in PowerShell.mp4 | 4.13MB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/05. Obfuscation in PowerShell.srt | 3.98KB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.mp4 | 18.95MB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/06. Demo- Defeating PowerShell Obfuscation.srt | 11.62KB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.mp4 | 19.34MB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/07. Lab- Performing Comprehensive Analysis.srt | 11.31KB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/08. Conclusion.mp4 | 1.99MB 03. Detecting and Defeating Code Obfuscation in Interpreted Code/08. Conclusion.srt | 2.37KB 04. Detecting and Defeating String Obfuscation in Native Code/01. Module Introduction.mp4 | 1.03MB 04. Detecting and Defeating String Obfuscation in Native Code/01. Module Introduction.srt | 1019B 04. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.mp4 | 6.04MB 04. Detecting and Defeating String Obfuscation in Native Code/02. Differences from Interpreted Code.srt | 6.21KB 04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.mp4 | 10.78MB 04. Detecting and Defeating String Obfuscation in Native Code/03. String Obfuscation.srt | 9.48KB 04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.mp4 | 19.38MB 04. Detecting and Defeating String Obfuscation in Native Code/04. Demo- Identifying String Obfuscation.srt | 12.36KB 04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.mp4 | 22.14MB 04. Detecting and Defeating String Obfuscation in Native Code/05. Lab- Defeating String Obfuscation.srt | 14.63KB 04. Detecting and Defeating String Obfuscation in Native Code/06. Conclusion.mp4 | 1.09MB 04. Detecting and Defeating String Obfuscation in Native Code/06. Conclusion.srt | 1.35KB 05. Detecting and Defeating Function Obfuscation in Native Code/01. Module Introduction.mp4 | 1.50MB 05. Detecting and Defeating Function Obfuscation in Native Code/01. Module Introduction.srt | 1.48KB 05. Detecting and Defeating Function Obfuscation in Native Code/02. Constructing an Import Table.mp4 | 2.85MB 05. Detecting and Defeating Function Obfuscation in Native Code/02. Constructing an Import Table.srt | 2.79KB 05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.mp4 | 25.07MB 05. Detecting and Defeating Function Obfuscation in Native Code/03. Walking the PEB, Parsing a PE.srt | 14.58KB 05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.mp4 | 28.32MB 05. Detecting and Defeating Function Obfuscation in Native Code/04. Demo- Dynamic API Resolution.srt | 12.88KB 05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.mp4 | 25.92MB 05. Detecting and Defeating Function Obfuscation in Native Code/05. Lab- Tracing Import Table Construction.srt | 14.22KB 05. Detecting and Defeating Function Obfuscation in Native Code/06. Conclusion.mp4 | 1.03MB 05. Detecting and Defeating Function Obfuscation in Native Code/06. Conclusion.srt | 1.08KB 06. Identifying Malware Use of Cryptography/01. Module Introduction.mp4 | 1.01MB 06. Identifying Malware Use of Cryptography/01. Module Introduction.srt | 967B 06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.mp4 | 25.98MB 06. Identifying Malware Use of Cryptography/02. Purpose of Cryptography in Malware.srt | 12.64KB 06. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.mp4 | 6.91MB 06. Identifying Malware Use of Cryptography/03. Tools to Help Identify Use of Cryptography.srt | 7.16KB 06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.mp4 | 24.89MB 06. Identifying Malware Use of Cryptography/04. Demo- Finding Cryptography.srt | 14.33KB 06. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.mp4 | 14.82MB 06. Identifying Malware Use of Cryptography/05. Lab- Analyzing Malware That Uses Cryptography.srt | 8.14KB 06. Identifying Malware Use of Cryptography/06. Conclusion.mp4 | 1.02MB 06. Identifying Malware Use of Cryptography/06. Conclusion.srt | 1.19KB 07. Leveling up Your Skills/01. Module Introduction.mp4 | 546.91KB 07. Leveling up Your Skills/01. Module Introduction.srt | 700B 07. Leveling up Your Skills/02. What You Learned.mp4 | 3.44MB 07. Leveling up Your Skills/02. What You Learned.srt | 3.65KB 07. Leveling up Your Skills/03. Leveling up Your Skills.mp4 | 2.13MB 07. Leveling up Your Skills/03. Leveling up Your Skills.srt | 2.57KB 07. Leveling up Your Skills/04. Conclusion.mp4 | 408.64KB 07. Leveling up Your Skills/04. Conclusion.srt | 554B malware-analysis-identifying-defeating-obfuscation.zip | 680.35KB

Recommend

Magnetic link has been copied to the cutting board