Toggle navigation
Video
♫ Thôn Quê
♫ Sông Đáy
♫ Liên Khúc
♫ Nhạc Đám Cưới
♫ Nonstop Việt
♫ Không Lời
♫ Nhạc Vàng Trữ Tình
♫ Nhạc Trẻ
Malware Analysis - Binary Refinery URL extraction of Multi-Layered PoshLoader for LummaStealer
MalwareAnalysisForHedgehogs
1.981 Lượt nghe
Prev
play
stop
Next
mute
max volume
00:00
00:00
repeat
Update Required
To play the media you will need to either update your browser to a recent version or update your
Flash plugin
.
Tải MP3
MÔ TẢ MP3
TIẾP THEO
Malware Analysis - Binary Refinery URL extraction of Multi-Layered PoshLoader for LummaStealer
We construct a Binary Refinery pipeline to extract the download URL of a multi-layered loader that uses JScript and PowerShell. Tweet: https://x.com/ShanHolo/status/1879808265607164367 Udemy course: https://www.udemy.com/course/windows-malware-analysis-for-hedgehogs-beginner-training/?couponCode=60EBAE52098A12D428B3 Coupon: 60EBAE52098A12D428B3 Follow me on Twitter: https://twitter.com/struppigel #malware #malwareanalysis #binaryrefinery #binref #powershell #javascript #JScript #lummastealer #loader #poshload #reverseengineering
00:00
Intro
00:30
Layer 1 - JScript
05:30
Layer 2 - JScript
10:38
Layer 3 - PowerShell
11:45
Layer 4 - PowerShell
15:47
Layer 5 - PowerShell Downloader
16:44
Full binref pipeline
Những bài liên quan
16:35
Antivirus myths and how AVs actually work
2.2 N
MalwareAnalysisForHedgehogs
20:51
Malware Analysis - Writing x64dbg unpacking scripts
2.2 N
MalwareAnalysisForHedgehogs
1:25:25
Explore Command-Line Driven Binary Transformations with Binary Refinery and its Jesko Huttenhain
1.2 N
Dr Josh Stroschein - The Cyber Yeti
54:36
Malware Analysis - Virut, a polymorphic file infector
1.2 N
MalwareAnalysisForHedgehogs
1:14:50
PowerShell Master Class - PowerShell Fundamentals
488.7 N
John Savill's Technical Training
14:17
How to FETCH data from an API using JavaScript ↩️
234.2 N
Bro Code
47:35
Malware Analysis - ConfuserEx 2 Deobfuscation with Python and dnlib, BBTok Loader
2.6 N
MalwareAnalysisForHedgehogs
1:02:01
JScript Deobfuscation - More WSHRAT (Malware Analysis)
62.5 N
John Hammond
30:44
Triaging Files on VirusTotal
3.2 N
MalwareAnalysisForHedgehogs
43:17
Learn PowerShell Automation in Less than 1 Hour
52 N
PowerShell Engineer
30:20
Are VPNs even safe now? Hacker Explains
577.2 N
David Bombal
22:53
I installed Linux (so should you)
5.3 Tr
PewDiePie
40:54
Malware Analysis - Writing Code Signatures
2.7 N
MalwareAnalysisForHedgehogs
14:18
BASH scripting will change your life
1.1 Tr
NetworkChuck
1:42:04
Snip3 Crypter/RAT Loader - DcRat MALWARE ANALYSIS
523.4 N
John Hammond
13:26
Malware Theory - Five Unpacking Methods and a Generic Unpacking Approach
3.3 N
MalwareAnalysisForHedgehogs
34:56
Malware Analysis - Unpacking Lumma Stealer from Emmenhtal and Pure Crypter
4.2 N
MalwareAnalysisForHedgehogs
14:53
MALWARE Analysis with Wireshark // TRICKBOT Infection
56.6 N
Chris Greer
20:33
the Linux File System explained in 1,233 seconds // Linux for Hackers // EP 2
2.3 Tr
NetworkChuck
Nhạc Theo Chủ Đề
Nhạc Không Lời
Nhạc Vàng HOT
Nhạc Liên Khúc
Nhạc DJ HOT
Nhạc Hà Nam
Nhạc Vĩnh Yên
Nhạc Hưng Yên
Nhạc Hải Dương
Nhạc Hà Tây
Nhạc Sông Đáy
LK Nhạc Vàng
LK Nhạc Trẻ
Liên kết website