How To Identify Unknown Crypto Functions [ Reverse Engineering AMA ]
How do you identify unknown crypto and compression algorithms when reverse engineering?
--
Big thanks to all the reverse engineers who helped us put this together!
Rattle (Jesko)
https://twitter.com/huettenhain
https://github.com/binref/refinery
Jordan (psifertex)
https://twitter.com/psifertex
https://binary.ninja/
Karsten
https://twitter.com/struppigel
https://www.youtube.com/c/MalwareAnalysisForHedgehogs
Drakonia
https://twitter.com/dr4k0nia
https://dr4k0nia.github.io/
C3rb3ru5
https://twitter.com/c3rb3ru5d3d53c
https://c3rb3ru5d3d53c.github.io/
Josh
https://twitter.com/jershmagersh
https://pwnage.io/
Dodo
https://twitter.com/dodo_sec
https://github.com/dodo-sec
Washi
https://twitter.com/washi_dev
https://washi.dev/
-----
OALABS PATREON
https://www.patreon.com/oalabs
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
Twitch
https://www.twitch.tv/oalabslive
OALABS GITHUB
https://github.com/OALabs
UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/
-----
Видео How To Identify Unknown Crypto Functions [ Reverse Engineering AMA ] канала OALabs
--
Big thanks to all the reverse engineers who helped us put this together!
Rattle (Jesko)
https://twitter.com/huettenhain
https://github.com/binref/refinery
Jordan (psifertex)
https://twitter.com/psifertex
https://binary.ninja/
Karsten
https://twitter.com/struppigel
https://www.youtube.com/c/MalwareAnalysisForHedgehogs
Drakonia
https://twitter.com/dr4k0nia
https://dr4k0nia.github.io/
C3rb3ru5
https://twitter.com/c3rb3ru5d3d53c
https://c3rb3ru5d3d53c.github.io/
Josh
https://twitter.com/jershmagersh
https://pwnage.io/
Dodo
https://twitter.com/dodo_sec
https://github.com/dodo-sec
Washi
https://twitter.com/washi_dev
https://washi.dev/
-----
OALABS PATREON
https://www.patreon.com/oalabs
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
Twitch
https://www.twitch.tv/oalabslive
OALABS GITHUB
https://github.com/OALabs
UNPACME - AUTOMATED MALWARE UNPACKING
https://www.unpac.me/#/
-----
Видео How To Identify Unknown Crypto Functions [ Reverse Engineering AMA ] канала OALabs
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Tips for Analysis of Large Complex Binaries [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/2rhyCGHHiSU/default.jpg)
![Why Is The PE Entry Point Not The Same As Main SEH and The _security_init_cookie [Patreon Unlocked]](https://i.ytimg.com/vi/suwZB3EA_u4/default.jpg)
![One Trick To Level Up Your Reverse Engineering [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/EjVVbM6ub00/default.jpg)
![How To Recognize Macro Encrypted Strings in Malware](https://i.ytimg.com/vi/fEAGYjhKzJY/default.jpg)
![RE Tools Spotlight: Binary Refinery - High Octane Malware Triage Analysis](https://i.ytimg.com/vi/4gTaGfFyMK4/default.jpg)
![Fast Malware Unpacking With CryptDecrypt and RtlDecompressBuffer](https://i.ytimg.com/vi/2zYokTkzIC8/default.jpg)
![Do Companies Actually Pay Ransomware [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/-CD82mTcy5A/default.jpg)
![M1 Mac Malware Analysis VM Setup with Windows 11 (Free)](https://i.ytimg.com/vi/0eR8yrDLV5M/default.jpg)
![What The Security Industry Should Know About Reverse Engineering [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/SffxAVWmbk4/default.jpg)
![Unpacking Pykspa Malware With Python and IDA Pro - Subscriber Request Part 1](https://i.ytimg.com/vi/HfSQlC76_s4/default.jpg)
![RedTeam Tricks Exposed - Reversing Engineering Syscalls To Evade Detection](https://i.ytimg.com/vi/Uba3SQH2jNE/default.jpg)
![Farewell 2017 - Reverse Engineering Bloopers and Fails](https://i.ytimg.com/vi/04qiaxDKA-g/default.jpg)
![Unpacking and Extracting TrickBot Malware Configuration With x64dbg and Python](https://i.ytimg.com/vi/EdchPEHnohw/default.jpg)
![Introduction to YARA Part 3 - Rule Use Cases](https://i.ytimg.com/vi/xutDqu_OiH8/default.jpg)
![Introduction to YARA Part 4 - Efficient Rule Development](https://i.ytimg.com/vi/xKeF_cPKXt0/default.jpg)
![Does Big Cyber Pay Better Than Startups [ Reverse Engineering AMA ]](https://i.ytimg.com/vi/9KE3Xu2c6c4/default.jpg)
![IDA Pro Decompiler Basics Microcode and x86 Calling Conventions](https://i.ytimg.com/vi/T0tdj1WDioM/default.jpg)
![Identify Unknown Malware Using Four Free Threat Intelligence Services](https://i.ytimg.com/vi/fY-2wqmVWWA/default.jpg)
![Process Memory Basics for Reverse Engineers - Tracking Memory With A Debugger [ Patreon Unlocked ]](https://i.ytimg.com/vi/eWYENJ5kG00/default.jpg)
![Career / Interview Advice for Reverse Engineers [ Twitch Clip ]](https://i.ytimg.com/vi/5PTeYipf8mc/default.jpg)