PikaBot Malware Analysis: Debugging in Visual Studio

Ryan Chapman: / rj_chap
Free Cybersecurity Education and Ethical Hacking with John Hammond
📧 JOIN MY NEWSLETTER ➡ jh.live/email
🙏 SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎 FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥 KZread ALGORITHM ➡ Like, Comment, & Subscribe!

Пікірлер: 41

  • @wildstorm74
    @wildstorm743 ай бұрын

    I now understand why people requested him. His very easy to understand what goes on.😎

  • @rj_chap

    @rj_chap

    3 ай бұрын

    Thanks much!

  • @golgothus
    @golgothus3 ай бұрын

    Loved every minute of this video. It's always fun to see what, how others work to de-obfuscate / reverse certain payloads. Hope to see similar videos in the future!

  • @trevlix
    @trevlix3 ай бұрын

    Can't agree more with Ryan for using Perl for one-liners!

  • @sammorreel9801
    @sammorreel98013 ай бұрын

    Script exploits are exactly why I disable the Windows Script Host.

  • @CuriousPiti
    @CuriousPiti3 ай бұрын

    With most scripts i found the easiest way is to clean up the code a little bit and then replace evals with prints. Let the code decode itself for you!

  • @ihacksi

    @ihacksi

    3 ай бұрын

    Genius! I do it in Powershell replacing IEXs.

  • @rj_chap

    @rj_chap

    3 ай бұрын

    Yes! Solid method :).

  • @ApexJnr

    @ApexJnr

    3 ай бұрын

    This was what i did the first time

  • @justinpinson8575
    @justinpinson85753 ай бұрын

    2 legends one episode ❤

  • @sampapap1188
    @sampapap11883 ай бұрын

    Hello John,love your content and especially this kind of things.Keep it up❤❤❤❤

  • @KenPryor
    @KenPryor3 ай бұрын

    This was really great. Ryan (and John too) is awesome.

  • @gvsai
    @gvsai3 ай бұрын

    It's awesome explanation, keep up guys.🎉

  • @MyDFIR
    @MyDFIR3 ай бұрын

    Ryan!!! Love this guy

  • @rj_chap

    @rj_chap

    3 ай бұрын

    Thank you!! 🎉

  • @dannnnnno
    @dannnnnno3 ай бұрын

    This dudes the real deal! A real friendly and approachable person makes learning easy

  • @rj_chap

    @rj_chap

    3 ай бұрын

    Thanks! Very much appreciate it!

  • @ukaszgeras6600
    @ukaszgeras66003 ай бұрын

    Lazy analyst approach to javascript malware -> replace eval with document.write and just run it.

  • @fadiallo1
    @fadiallo13 ай бұрын

    Love You Everyone.

  • @BrutusMaximusAurelius
    @BrutusMaximusAurelius3 ай бұрын

    This pals from palword got malicious real quick with that AI.

  • @luisPerez-xg2hg
    @luisPerez-xg2hg3 ай бұрын

    Brutal ❤

  • @ReligionAndMaterialismDebunked
    @ReligionAndMaterialismDebunked3 ай бұрын

    Early crew. Shalom. 🤝🤓

  • @IrishKingzz
    @IrishKingzz3 ай бұрын

    Love this dudes positivity

  • @rj_chap

    @rj_chap

    3 ай бұрын

    Ty!

  • @mystikspiral21
    @mystikspiral213 ай бұрын

    This is badass!

  • @ghazalabdelghafour346
    @ghazalabdelghafour3463 ай бұрын

    Best hacker on KZread ❤❤

  • @dyarizadeh3
    @dyarizadeh33 ай бұрын

    Does anyone have a link for Box PowerShell?

  • @xCheddarB0b42x
    @xCheddarB0b42x3 ай бұрын

    one point one million and rising well deserved

  • @alex1602
    @alex16023 ай бұрын

    Why wouldnt you do something like: 1+1 > 2 a= "1+1" > '1+1' eval(a) > 2 function eval(st) { console.log(st) } > undefined eval(a) > 1+1 It will stop your code from working but you can get the scripts it actually tries to run and replace the obfuscated stuff

  • @gonehaywire
    @gonehaywire3 ай бұрын

    Edit 3.js and replace eval with console.log then run. No need for A debugger to Comcast strings!!!

  • @rj_chap

    @rj_chap

    3 ай бұрын

    There could be hidden evals, which is why I like to debug each function return. In this case, that would work. But I don't like to rely on finding a single eval and only console logging it.

  • @dyarizadeh3
    @dyarizadeh33 ай бұрын

    Remind me to add "cornucopia" to my vocabulary when describing cyber distros

  • @user-hr8ow4pq3t
    @user-hr8ow4pq3t3 ай бұрын

    This tool seems impressive

  • @ThisIsJustADrillBit
    @ThisIsJustADrillBit3 ай бұрын

    First!

  • @Badams814
    @Badams8143 ай бұрын

    Ryan is the pimp, love his trainings.

  • @anarchoraven
    @anarchoraven2 ай бұрын

    Qui is latin for what, Pikachu what? Meme. Also did the dude seriously put the divine comedy in latin as obfuscation?

  • @WIKIKALI
    @WIKIKALI3 ай бұрын

    Thanks Very helpful

  • @bashbored1255
    @bashbored12553 ай бұрын

    jsnice

  • @nicksonpinto2074
    @nicksonpinto20743 ай бұрын

    Like there's js-beautify there is uglify-js. Hehe

  • @rj_chap

    @rj_chap

    3 ай бұрын

    I didn't know that! Ty!

  • @superJK92

    @superJK92

    3 ай бұрын

    Because of course there is