Home
Search results “Crypto obfuscator unity3d linux”
Tutorial Abronsius Code Obfuscator
 
06:33
Tutorial Abronsius Code Obfuscator
Views: 413 RicardoX Trincado
Malware Analysis   Very Cool AES Encrypted Phishing Site
 
08:56
Ring Ø Labs malware report and sample download here: http://www.ringzerolabs.com/2017/08/aes-encrypted-phishing-site.html Ring Ø Labs Analysis Environment Setup: https://www.youtube.com/edit?o=U&video_id=Onqql1Zz3OE Ring Ø Labs is a Reverse Engineering site dedicated to analyzing malware, researching emergent security topics, and hacking the planet. www.RingZeroLabs.com Here are some approaches in reverse engineering a malware sample: Reverse engineer: The most obvious approach is to completely reverse engineer a piece of malware. This obviously takes a great amount of time, so other approaches are more practical. Exploitation techniques: Another approach you can take is to focus on the exploitation techniques of a piece of malware. Occasionally you will see a piece of malware that is using a new exploitation technique, or is exploiting a zero-day vulnerability. In this case you may be interested only in the specific exploitation technique so you can timebox your analysis and only look at the exploitation mechanisms. Obfuscation: Malware will often obfuscate itself and make itself difficult to analyze. You might come across malware that you have seen before without obfuscation. In that case you may only want to focus on reverse engineering the new parts. Encryption methods: A common type of malware these days is ransomware. Ransomware essentially encrypts the victim's files and locks them up so that they can't be accessed or read. Oftentimes the authors of ransomware will make mistakes when they implement the encryption mechanisms. So if you focus your research on the encryption mechanisms you might be able to find weaknesses in their implementation and/or you might be able to find hard-coded keys or weak algorithms. C&C communication: This is something that is pretty commonly done when looking at malware. Analysts often want to figure out what the communication protocol is between a piece of malware on the client's side and the server on the command and control side. The communication protocol can actually give you a lot of hints about the malware’s capabilities. Attribution: Murky area - kind of like a dark art. It usually involves a lot of guesswork, knowledge of malicious hacking teams and looking at more than one piece of malware. Categorization and clustering: You can reverse engineer malware from a broader point of view. This involves looking at malware in bulk and doing a broad-stroke analysis on lots of different malware, rather than doing a deep dive. Techniques Now, let’s look at techniques that can be utilized while analyzing malware. First of all, we use static analysis. This is the process of analyzing malware or binaries without actually running them. It can be as simple as looking at metadata from a file. It can range from doing disassembly or decompilation of malware code to symbolic execution, which is something like virtual execution of a binary without actually executing it in a real environment. Conversely, dynamic analysis is the process of analyzing a piece of malware when you are running it in a live environment. In this case, you are often looking at the behavior of the malware and looking at the side effects of what it is doing. You are running tools like process monitor and sysmon to see what kinds of artifacts a piece of malware produces after it is run. We also use automated analysis. Oftentimes if you are looking at malware you want to automate things just to speed up the process to save time. However, use caution, as with automated analysis sometimes things get missed because you are trying to do things generically. If a piece of malware contains things like anti-debugging routines or anti-analysis mechanisms, you may want to perform a manual analysis. You need to pick the right tools for the job. DISCLAIMER: Our videos are strictly for documentary, educational, and entertainment purposes only. Imitation or the use of any acts depicted in these videos is solely AT YOUR OWN RISK. We (including YouTube) will not be held liable for any injury to yourself or damage to others resulting from attempting anything shown in any our videos. We do not endorse any specific product and this video is not an attempt to sell you a good or service. These videos are free to watch and if anyone attempts to charge for this video notify us immediately. By viewing or flagging this video you are acknowledging the above.
Views: 238 H4rM0n1cH4cK
How to decompile (read source code of) .NET Framework assemblies using ILSpy
 
03:47
Read the original article here: http://ourcodeworld.com/articles/read/456/how-to-decompile-read-source-code-of-net-framework-assemblies-using-ilspy Github Repository of ILSpy: https://github.com/icsharpcode/ILSpy Please subscribe to our channel. For more awesome content visit http://ourcodeworld.com Music: http://www.purple-planet.com Follow us on Twitter https://twitter.com/ourcodeworld Like us on Facebook: http://www.facebook.com/ourcodeworld
Views: 4400 Our Code World
[100% working and safest] How to get RedGate .NET ReflectorVSPRO 8.5 [Latest] for free 2015
 
10:44
Hello there, In this video I am gonna show you how to RedGate .NET REFLECTOR 8.5 VSPro Full edition for free. Its 99% safe, the safest out there!, and it 100% works!. Download link: http://onhax.net/tag/redgate-net-reflector-crack I haven't uploaded a lot of videos on youtube lately, but once my exams get over and I get better at editing, i will upload shorter, narrated and better videos. Thank you for watching and if you are interseted in more cracking videos please do subscribe. EDIT: The following website (onhax.net) has been flagged by 3 avs as malicious as of 25/12/16. Before visiting any cracking site, run the latest virustotal scan along with using a hardened linux or live linux distro. Finally test the crack in a virtual environment by yourself with proexp, AVs or IS, AM, netcat, firewall, etc & then use it in ur main PC. I am not responsible for any damage to your PC. Just make sure thingd are safe, if your not into disassembling, network monitoring or direct malware analysis, try to follow the technique used on TPSC channel, it's simple & quite safe. This version is an older version, look for 9.5 or newer versions.
Views: 1964 b888
First Look: LG G7 ThinQ (iPhone X Comparison)
 
04:46
In this video, we go hands on and get some first impressions of the all new LG G7 Thin Q, one of the first major smartphones in the US (aside from Apple) to include the infamous notch. Read more about the LG G7 ThinQ here - https://www.macrumors.com/2018/05/02/lg-g7-thinq-compared-to-iphone-x/
Views: 30051 MacRumors
Hands-On With Android P's New Swipe-Based Gesture System
 
04:47
Google yesterday introduced the newest version of Android, Android P, at its Google I/O developer conference held in Mountain View, California. Android P includes a few enticing features like a new Dashboard for monitoring usage and an adaptive battery feature for improving battery life, but what was of interest to iPhone users was the new gesture system. Android P adopts a new gesture-based system interface that's reminiscent of the interface of the iPhone X, so we decided to download the Android P beta to check it out for ourselves. Read more - https://www.macrumors.com/2018/05/09/hands-on-with-android-p/
Views: 53661 MacRumors