Рет қаралды 11,679
📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training
💵 Support the Channel:
You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more!
☕️ Buy Me Coffee:
www.buymeacoffee.com/nahamsec
JOIN DISCORD:
discordapp.com/invite/ucCz7uh
🆓 🆓 🆓 $200 DigitalOcean Credit:
m.do.co/c/3236319b9d0b
💬 Social Media
- / nahamsec
- / nahamsec
- twitch.com/nahamsec
- / nahamsec1
Timestamps
-------
00:00 Introduction
00:02 Learning the basics of malware analysis and hunting.
01:56 Malware can be delivered through various methods.
05:48 Exploring the dark web for potential malware sources.
07:48 Exploring different types of malware on the dark web
11:58 Tracking malware creators through signatures
13:53 Exploring malware samples using virtual machines and different operating systems.
18:00 Identifying and tracking malware through indicators of compromise
19:56 Identifying and reporting vulnerable system to Steam
23:42 Analysis of malware distribution source
25:38 Identifying infected files communicating with specific domains
29:24 Accessing and analyzing malware samples using online resources
31:29 Use tools like WireShark and Joe Sandbox for malware analysis.
35:00 Examining malware's activities and potential impact
36:52 Investigating if a program is potentially a cleaner or malware.
40:30 Analyzing network traffic and identifying potential security threats.
42:22 Understanding the safe sandbox for malware hunting