У нас вы можете посмотреть бесплатно Obfuscation Techniques For AntiVirus Evasion | TryHackMe Obfuscation Principles или скачать в максимальном доступном качестве, которое было загружено на ютуб. Для скачивания выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this video walk-through, we covered the first part of obfuscation techniques and principles for signature and AV evasion where we focused on object concatenation. ********** Receive Cyber Security Field Notes and Special Training Videos / @motasemhamdan Writeup https://motasem-notes.net/obfuscation... ******* Layered Obfuscation Taxonomy | Research Paper https://cybersecurity.springeropen.co... ************* Store https://buymeacoffee.com/notescatalog... Patreon / motasemhamdan LinkedIn [1]: / motasem-hamdan-7673289b [2]: / motasem-eldad-ha-bb42481b2 Instagram / mastermindstudynotes Google Profile https://maps.app.goo.gl/eLotQQb7Dm6ai... Twitter / manmotasem Facebook / motasemhamdantty ****** 0:00 - Introduction to Obfuscation Techniques 0:12 - Overview of Obfuscation Principles and Signature Evasion 0:40 - Steps to Start Learning Obfuscation 1:00 - Definition of Obfuscation 1:11 - Recommended Reading for Obfuscation 1:42 - Key Concepts of Obfuscation 2:12 - Obfuscation Process Explained 3:00 - Goals of Obfuscation: Protecting Intellectual Property 4:03 - Obfuscation in Software Development 5:00 - Role of Obfuscation in Signature Evasion 6:01 - Taxonomy of Obfuscation Techniques 7:01 - Focus on Code Element Layer 7:40 - Methods for Data Obfuscation 8:20 - Techniques: Array Transformation, Data Encoding, and More 10:05 - Concatenation Example in Programming 12:11 - Concatenation in Different Programming Languages 13:11 - Practical Example: Powershell Code Obfuscation 14:10 - Identifying Problematic Code for Antivirus Detection 15:14 - Applying Concatenation for Obfuscation 16:35 - Testing the Obfuscated Code 17:02 - Exploring Additional Obfuscation Techniques