Media Summary: The class materials are available at Follow us on Twitter for class news ... The strings of this trojan-spy are obfuscated. We figure out that this is a monoalphabethic substitution cipher and patch the trojan ... My gift to you all. Thank you Husky Practical

Malware Analysis Hook Injection Poc By Robert Kuster - Detailed Analysis & Overview

The class materials are available at Follow us on Twitter for class news ... The strings of this trojan-spy are obfuscated. We figure out that this is a monoalphabethic substitution cipher and patch the trojan ... My gift to you all. Thank you Husky Practical Join us for an exclusive livestream featuring Evasive The newest ROKRAT variant injects its shellcode into cmd.exe, which will in turn decrypt a PE image. We debug the injected code ... MS Office Built-In Feature Could be Exploited to Create Self-Replicating

Get the class materials to follow along at Follow us on Twitter ... Information Security Club at San Jose State University. Windows I describe three ways to find or get fresh Short example of how to deflect a DLL injenction to a process of our choice in order to better study it.

Photo Gallery

Malware Analysis - Hook Injection PoC by Robert Kuster
2013 Day2P04 LoB: IAT Hooking Demo
Malware Theory - Process Injection
Malware Analysis - Code Injection via CreateRemoteThread & WriteProcessMemory
Malware Analysis - Deobfuscating Loyeetro Trojan-Spy
Hook Analyser 2 1 Demo
Malware Analysis In 5+ Hours - Full Course - Learn Practical Malware Analysis!
Unveiling Go Malware: Analysis Challenges & Expert Techniques with Kyle Cucci
Malware Analysis   Hook Analyser 1 4
Malware Analysis - ROKRAT Unpacking from Injected Shellcode
PoC 1: Macro-Based Self-Replicating Malware
Dynamic Malware Analysis D2P14 Maneuvering IAT EAT Inline Hooking Overview
View Detailed Profile
Malware Analysis - Hook Injection PoC by Robert Kuster

Malware Analysis - Hook Injection PoC by Robert Kuster

We analyse a

2013 Day2P04 LoB: IAT Hooking Demo

2013 Day2P04 LoB: IAT Hooking Demo

The class materials are available at http://www.OpenSecurityTraining.info/LifeOfBinaries.html Follow us on Twitter for class news ...

Malware Theory - Process Injection

Malware Theory - Process Injection

This is an overview to common process

Malware Analysis - Code Injection via CreateRemoteThread & WriteProcessMemory

Malware Analysis - Code Injection via CreateRemoteThread & WriteProcessMemory

We take a look into the

Malware Analysis - Deobfuscating Loyeetro Trojan-Spy

Malware Analysis - Deobfuscating Loyeetro Trojan-Spy

The strings of this trojan-spy are obfuscated. We figure out that this is a monoalphabethic substitution cipher and patch the trojan ...

Hook Analyser 2 1 Demo

Hook Analyser 2 1 Demo

Hook

Malware Analysis In 5+ Hours - Full Course - Learn Practical Malware Analysis!

Malware Analysis In 5+ Hours - Full Course - Learn Practical Malware Analysis!

My gift to you all. Thank you Husky Practical

Unveiling Go Malware: Analysis Challenges & Expert Techniques with Kyle Cucci

Unveiling Go Malware: Analysis Challenges & Expert Techniques with Kyle Cucci

Join us for an exclusive livestream featuring Evasive

Malware Analysis   Hook Analyser 1 4

Malware Analysis Hook Analyser 1 4

Malware Analysis Hook Analyser 1 4

Malware Analysis - ROKRAT Unpacking from Injected Shellcode

Malware Analysis - ROKRAT Unpacking from Injected Shellcode

The newest ROKRAT variant injects its shellcode into cmd.exe, which will in turn decrypt a PE image. We debug the injected code ...

PoC 1: Macro-Based Self-Replicating Malware

PoC 1: Macro-Based Self-Replicating Malware

MS Office Built-In Feature Could be Exploited to Create Self-Replicating

Dynamic Malware Analysis D2P14 Maneuvering IAT EAT Inline Hooking Overview

Dynamic Malware Analysis D2P14 Maneuvering IAT EAT Inline Hooking Overview

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter ...

Windows Hooks

Windows Hooks

Information Security Club at San Jose State University. Windows

Malware Analysis - Finding Fresh Samples Without Paid Account

Malware Analysis - Finding Fresh Samples Without Paid Account

I describe three ways to find or get fresh

Hook Analyser 1.1

Hook Analyser 1.1

Hook

Malware Development: Process Injection

Malware Development: Process Injection

Malware

Bypassing EDR's,  AV's Using API Hooking and Unhooking method

Bypassing EDR's, AV's Using API Hooking and Unhooking method

... is no

Preview - Hook Analyser 3.1 :  Cyber Threat Intelligence

Preview - Hook Analyser 3.1 : Cyber Threat Intelligence

Preview of

Pimping, ehem... Hooking Malware

Pimping, ehem... Hooking Malware

Short example of how to deflect a DLL injenction to a process of our choice in order to better study it.