Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
Finally released part 2 of my »Reversing
#WannaCry with#Ghidra« series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.https://www.youtube.com/watch?v=Q90uZS3taG0 … -
Interested in the details of CVE-2020-0601/Curveball? I released a video on Friday going into the technical details of the Microsoft CryptoAPI vulnerability!https://www.youtube.com/watch?v=8RI60aRyhoE …
-
I just published a video explaining the details of CVE-2020-0601 aka Curveball: The Microsoft CryptoAPI vulnerability that was reported by the NSA.https://www.youtube.com/watch?v=8RI60aRyhoE?twitterlinks …
-
Just published a new video: Backdooring an IoT camera by creating a malicious firmware upgrade!https://www.youtube.com/watch?v=hV8W4o-Mu2o …
Prikaži ovu nit -
-
Also coming: A Sleigh emulator for easier developmentpic.twitter.com/YqkrSwiaYY
-
System-call decompilation is coming to Ghidra in 9.1! Awesomepic.twitter.com/RN88CmMhYh
-
-
Just released part 1 of analyzing
#WannaCry in#Ghidra! In this video we will find the killswitch, look at its installation/persistence methods and extract/decrypt the resources contained in the malware!https://youtu.be/Sv8yu12y5zM -
Best channel milestone! Thanks guys, this is awesome.pic.twitter.com/BktQGJESZb
-
Pretty clear winner - now I only have to recover my voice from a cold and then we will look at how WannaCry works and how
@MalwareTechBlog stopped its further spreading using the kill-switch domain!pic.twitter.com/WRWCIQwL8Q
Prikaži ovu nit -
Luckily
#Ghidra comes with a periodic table plugin!pic.twitter.com/vvxaMnZvDw
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.