Analysing and Creating a Malicious File (Step-by-Step)
Автор: TrompieSec
Загружено: 2025-07-06
Просмотров: 251
Описание:
In this video, we analyse a suspicious file and then turn a legitimate EXE into a malicious one (step-by-step).
Spot hidden threats using tools like DIE (Detect It Easy), ProcMon, Resource Monitor, Netstat, and Objdump. We explain file entropy, code caves, and how to verify file integrity using checksums.
Then we dive into Shellter to modify a real program and deliver a payload, showing exactly what a malicious file can do once executed. Finally, we share real-world tips on how to protect yourself.
** This is for educational purposes only. **
//Binaries used
https://www.shellterproject.com/downl...
https://github.com/hasherezade/pe-bear
https://github.com/horsicq/Detect-It-...
https://learn.microsoft.com/en-us/sys...
//Chapters
00:00 Intro
00:40 Real Intro
01:40 Entropy Analysis (DIE)
03:37 Entropy Explained
05:22 ProcMon - Process Analysis
06:30 ProcMon Filters
07:20 TCP Connections
08:26 Resource Monitor Checks
09:23 Netstat Checks
10:25 Objdump - Malicious Code Hexdump
12:11 Code Cave Explained
14:08 Checksum Hash Checks
17:12 What can this Malicious file actually do
19:29 Why migrate processes
20:59 Meterpreter cool built-in functions
22:55 How are these files made
24:00 Installing Shellter
25:24 Using Shellter
29:34 How to protect yourself
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: