Analysing a Collection of Windows Binaries and Embedded Resources - FLARE-On 2018
In this video we look at another FLARE-On 2018 challenge. This one is weird as we have to somehow automate the analysis of a big collection of binaries. We also learn something about embedded resources.
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#ReverseEngineering #CTF
Видео Analysing a Collection of Windows Binaries and Embedded Resources - FLARE-On 2018 канала LiveOverflow
-=[ 🔴 Stuff I use ]=-
→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb
US Store Front:* https://www.amazon.com/shop/liveoverflow
-=[ ❤️ Support ]=-
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join
-=[ 🐕 Social ]=-
→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/
-=[ 📄 P.S. ]=-
All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.
#ReverseEngineering #CTF
Видео Analysing a Collection of Windows Binaries and Embedded Resources - FLARE-On 2018 канала LiveOverflow
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Analysing a Firefox Malware browserassist.dll - FLARE-On 2018Going to Chinese Hacking Competition - Real World CTF FinalsWhat is PHP and why is XSS so common there? - web 0x02What do Nintendo Switch and iOS 9.3 have in common? CVE-2016-4657 walk-throughMMORPG Bot Reverse Engineering and TrackingFlare-on 2020 - Level 2 - garbage solutionWhy Does MissingNo Duplicate Items???Solving a JavaScript crackme: JS SAFE 2.0 (web) - Google CTF 2018Defeat 2FA token because of bad randomness - rhme2 Twistword (Misc 400)DEF CON CTF 2018 FinalsDeveloping a TCP Network Proxy - Pwn Adventure 3Simple Tools and Techniques for Reversing a binary - bin 0x06Syscalls, Kernel vs. User Mode and Linux Kernel Source Code - bin 0x09DO NOT USE alert(1) for XSSRemcos RAT Unpacked From VB6 With x64dbg DebuggerBasic Windows Reversing and Attacking Weak Crypto - FLARE-On 2018Best Operating Systems for Hacking?!HOW FRCKN' HARD IS IT TO UNDERSTAND A URL?! - uXSS CVE-2018-6128Format String to dump binary and gain RCE - 33c3ctf ESPR (pwn 150)What is a Browser Security Sandbox?! (Learn to Hack Firefox)