The ART of malware analysis
Ғылым және технология
🔍🛡️ Dive into a hands-on demo of #MalwareHunting with a senior security researcher! Explore threat identification, key tools, and mitigation in this immersive experience. Essential for all in #Cybersecurity! 📺
#InfoSec #MalwareInvestigation
CHAPTERS:
0:00 - 0:40 Coming Up
0:41 - 3:56 Who Am I - Filipi Pires (Senior Security Researcher)
3:57 - 4:50 What is a Threat ?
4:51 - 10:49 Static and Dynamic Analysis (Lifecycle framework)
10:50 - 53:28 Hands-On Demo & Associated Investigation Tools
53:29 - 1:07:32 Investigation summary
Watch more cyber security Video's
1. Does SQL injection still work ? Lessons by Master Hacker - • SQL for Hackers by Mas...
2. Behind Darknet Diaries with Jack Rhysider - • Jack Rhysider Darknet ...
3. Shield Your Wi-Fi from Hackers with these Essential Security Measures • Hacking home WIFI with...
4. Meet the man who exposed the world's first cyber weapon - • Unraveling the Impact ...
5. How to become a master hacker (With OTW) - • how to become a master...
6. Hacking SCADA systems - • hacking industrial con...
7. SW define radio hacking - • radio hacking with a m...
8. Pegasus spyware - • pegasus the spyware te...
9. Stuxnet - • Explaining cybersecuri...
10. API Hacking - • How Hacking APIs Works...
11. DNS Hacking - • DNS hijacking | Cybers...
12. How to Build a hacking Box - • how to build your hack...
13. NotPetya - • notpetya attack
14. OSINT - Open Intelligence tools - • OSINT framework Explai...
Thank you for being here! Stay Safe and Healthy,
Yaniv Hoffman
#cybersecurity
#hacking
#threatintelligence
#webapplicationsecurity
#yanivhoffman
#hackingtools
#informationtechnology
#cybersecuritytools
#cyberattacks
#cybersecuritycertification
#informationtechnology
#infosec
#informationtechnology
#cybersecuritynews
Пікірлер: 18
Hi Everyobe, i had the pleasure to cooperate with Master Filipi Pires for an HANDS-ON demo of file manipulation in an episode of Hunting Malware. Enjoy!
Great Great lesson! Thank you Yaniv! 💥 eye opening! of course a thank you also to Mr.Pires, very enjoyable presentation
@yanivhoffman
8 ай бұрын
Hi buddy, so happy you enjoyed it .
@filipipires5498
7 ай бұрын
I really appreciate it 👊
❤❤
@yanivhoffman
8 ай бұрын
Thank you
@uniquezzzz8641
8 ай бұрын
@@yanivhoffman Need More Types of method and activities We wanna go for cyber Carrior😀😇
Great video! Thank you both for this🔥
@yanivhoffman
4 ай бұрын
Thx a lot for watching and writing the feedback ❤️
Thank you so much Yaniv!
@yanivhoffman
8 ай бұрын
Thank you my friend for sharing your knowledge with everyone ❤️
@fextrydra
8 ай бұрын
Very very very Nice!!!
@jackthibo7644
8 ай бұрын
Thank you very much for this very cool hands on video! Just a quick question: You can manipulate the file content to be recognised as a particular file type by the file tool in Linux. If you manipulate that content you could for sure hide executable code inside a seemingly legit file. My question is though, can you manipulate the database used by the file tool or is that hard coded? Also in a nutshell, windows relies very heavily on file extensions (which is why by default it hides it from the file explorer UI) Vs Linux it looks at other stuff as well......
@brunocastegliani
8 ай бұрын
Parabens Filipi! Muito legal ver brasileiros em canais internacionais.
@filipipires5498
8 ай бұрын
@@brunocasteglianiVamos com tudo meu amigo 🤩
Yaniv, can we do a hands on video about manipulation of the winsock in windows? I have a very interesting piece of software which blocks specific traffic and could be super interesting for review!
@yanivhoffman
6 ай бұрын
Will be happy, please be in touch