Рет қаралды 13,489
View our malware analysis training: AGDCservices.com/training/
Follow me on Twitter for RE tips and resources: / agdcservices
View our malware analysis products to aid in your RE efforts (Ghidra / python scripts, tools, and individual analysis results)
github.com/agdcservices
Get resources to help with learning malware analysis
agdcservices.com/blog/resourc...
Ghidra is a powerful disassembler and decompiler that lets you statically reverse engineering malware, but it’s not intuitive how to use. In this video, we will go over how to perform the basic operations needed for malware analysis so you can take advantage of this great resource. We will cover all the standard tasks you use in daily analysis, opening files, following cross references, renaming variables, making comments, saving your marked up analysis, and more.
#ReverseEngineering #MalwareAnalysis #SRE #RE #Ghidra