У нас вы можете посмотреть бесплатно Ranswomare Analysis & Reverse Engineering | Risen Ransomware | LetsDefend Walkthrough или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
The video provides an in-depth analysis of the Risen ransomware, a malicious software designed to encrypt user files and extort payments from victims. The analysis involves reverse engineering the ransomware using various tools to uncover its code structure, execution flow, and encryption logic. **** Receive Cyber Security Field, Certifications Notes and Special Training Videos https://buymeacoffee.com/notescatalog... Writeup https://motasem-notes.net/ranswomare-... ****** Store https://buymeacoffee.com/notescatalog... Patreon / motasemhamdan Instagram / mastermindstudynotes Google Profile https://maps.app.goo.gl/eLotQQb7Dm6ai... LinkedIn [1]: / motasem-hamdan-7673289b [2]: / motasem-eldad-ha-bb42481b2 Instagram / mastermindstudynotes Twitter / manmotasem Facebook / motasemhamdantty *** 00:00 Introduction - Analyzing Risen Ransomware 00:11 Sample Analysis - How Risen Ransomware Encrypts Files 00:25 Ransom Note - Contact Details & Bitcoin Address 00:47 Extortion & Data Leak Threats 01:14 Reverse Engineering Setup - Using IDA Debugger 01:38 Let's Defend Challenge - Practical Analysis 02:02 Extracting the Malware Executable 02:33 Tools for Analysis - IDA, Immunity Debugger, DNS Spy 03:12 Exploring the Malware Binary in IDA 03:46 Main Function & Windows API Calls 05:00 Language-Based Evasion Techniques 07:13 Answering Challenge Questions 07:26 File Created by Malware - 'Risen_locks' 07:39 Mutex Created - 'Risen_mutex' 07:50 Anti-Analysis Techniques - Avoiding 5 Languages 08:55 Finding System Info API Address 10:09 First API Call in Function Sub_43120 10:49 Scheduled Task Created - 'System Defense' 11:41 Volume Enumeration for Encryption 14:19 Telegram Username of Threat Actor 15:23 Finding the Encryption Key & File Extension 17:29 Searching for 'MoveFile' API 18:36 Extracting Ransomware File Extension 19:12 Finding the Encryption Routine 20:50 Crypto Functions & Key Generation 26:37 Decrypting Encrypted Files 28:20 Verifying Encrypted Files with 'Risen' Marker 31:08 Renaming Encrypted Files with Attacker's Contact 33:40 Summary & Final Thoughts on Risen Ransomware