Memory Forensics with Volatility | PDF Malware Analysis with Any.Run | Cyber Incident Response
We covered a cyber incident response case study that involved a malicious PDF malware delivered through a…
We covered a cyber incident response case study that involved a malicious PDF malware delivered through a…
We covered an introduction to logging where we discussed the logic of creating logs and we analyzed…
We covered analyzing an office document that has an embedded Macro code written in Visual Basic. The…
We covered the second part of malware static analysis. We went through analyzing strings, hashes and signatures….
We covered debugging as a method to uncover evasion used by malwares to evade detection. This was…
Hunting viruses and malwares take more than static or dynamic analysis alone. Usually a combination of different…
Premise In this video walkthrough, we covered the basics of Yara file pattern matching to analyze Malwares…