Media Summary: 0:00 Intro 1:50 md5 value of the file 2:10 VirusTotal 5:28 exiftool 7:44 strings 13:10 xorsearch You can access this course on ... This video will teach you how to analyse a In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to

Malicious Documents Analysis - Detailed Analysis & Overview

0:00 Intro 1:50 md5 value of the file 2:10 VirusTotal 5:28 exiftool 7:44 strings 13:10 xorsearch You can access this course on ... This video will teach you how to analyse a In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to Can you trust your 3rd party software? We can help you. Fill out this form → In this full series we will talk about Incident Response and it will be a Free Training Course for everyone. Today is Day-15 and I ...

Photo Gallery

Malware Analysis - Malicious MS Office files without Macros
Static Malicious Document Analysis
Cybersecurity SOC Analyst Lab - Malware Analysis (RTF Document)
Malware Analysis of Malicious Documents
#2 How To Analyse a Malicious Word Document
Analyzing Malicious Office Documents   Presented By  Didier Stevens Workshop
How to Analyze a Malicious Word Document
Incident Response Training Course, Malicious Document Analysis, Day 15
Malicious Documents Analysis
How to investigate a malicious DLL
How to investigate malicious Microsoft Office files
Static Analysis - Malicious Document
View Detailed Profile
Malware Analysis - Malicious MS Office files without Macros

Malware Analysis - Malicious MS Office files without Macros

We look at two techniques for MS Office

Static Malicious Document Analysis

Static Malicious Document Analysis

0:00 Intro 1:50 md5 value of the file 2:10 VirusTotal 5:28 exiftool 7:44 strings 13:10 xorsearch You can access this course on ...

Cybersecurity SOC Analyst Lab - Malware Analysis (RTF Document)

Cybersecurity SOC Analyst Lab - Malware Analysis (RTF Document)

Dive into the intriguing world of

Malware Analysis of Malicious Documents

Malware Analysis of Malicious Documents

Access the course here: https://www.udemy.com/course/

#2 How To Analyse a Malicious Word Document

#2 How To Analyse a Malicious Word Document

This video will teach you how to analyse a

Analyzing Malicious Office Documents   Presented By  Didier Stevens Workshop

Analyzing Malicious Office Documents Presented By Didier Stevens Workshop

In this workshop (2 hours), I explain how to use the tools (oledump, emldump, YARA rules, …) I developed to

How to Analyze a Malicious Word Document

How to Analyze a Malicious Word Document

Can you trust your 3rd party software? We can help you. Fill out this form → https://register.reversinglabs.com/solarwinds-breach ...

Incident Response Training Course, Malicious Document Analysis, Day 15

Incident Response Training Course, Malicious Document Analysis, Day 15

In this full series we will talk about Incident Response and it will be a Free Training Course for everyone. Today is Day-15 and I ...

Malicious Documents Analysis

Malicious Documents Analysis

Malicious Documents Analysis

How to investigate a malicious DLL

How to investigate a malicious DLL

MCSI Certified DFIR Specialist https://www.mosse-institute.com/certifications/mdfir-certified-dfir-specialist.html MCSI ...

How to investigate malicious Microsoft Office files

How to investigate malicious Microsoft Office files

MCSI Certified DFIR Specialist https://www.mosse-institute.com/certifications/mdfir-certified-dfir-specialist.html MCSI ...

Static Analysis - Malicious Document

Static Analysis - Malicious Document

Static

Methods For Analyzing Malicious Office Documents (Recon 2008)

Methods For Analyzing Malicious Office Documents (Recon 2008)

Full Video Details: http://www.securitytube.net/video/284.

Analysing Malicious Documents - 44CON 2015 Training

Analysing Malicious Documents - 44CON 2015 Training

I teach a 2 day training "Analysing

MATT Assignment Malicious Document Analysis

MATT Assignment Malicious Document Analysis

Khor Kai Yuan S10241916.