У нас вы можете посмотреть бесплатно Working with UPX - Manual Unpacking with IDA Pro, x32dbg and Scylla или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Understanding packing is essential for anyone interested in malware analysis or reverse engineering. UPX is a popular packer, partly because it is free and open source. And while there are potentially easy ways to unpack executables with UPX, it is still commonly used by malware authors (and for technical interviews :) ). In this video, we'll take a look at how UPX works by investigating packed samples using PEStudio and Detect-It-Easy. We'll then discuss common packing characteristics exhibited by these samples that can apply to other packers as well. Next, we'll hit the easy button and unpack our sample using UPX itself. And finally, we'll crack open our packed sample in IDA Pro and identify where the unpacking takes place before dumping our payload from memory using x32dbg and Scylla. This can be helpful to understand as malware authors may modify UPX to break the ability to easily unpack with UPX. By the end of this video, you'll have practical, hands-on experience working with UPX packed samples. Cybersecurity, reverse engineering, malware analysis and ethical hacking content! 🎓 Courses on Pluralsight 👉🏻 https://www.pluralsight.com/authors/j... 🌶️ YouTube 👉🏻 Like, Comment & Subscribe! 🙏🏻 Support my work 👉🏻 / joshstroschein 🌎 Follow me 👉🏻 / jstrosch , / joshstroschein ⚙️ Tinker with me on Github 👉🏻 https://github.com/jstrosch