کانال بایت امن – Telegram
کانال بایت امن
4.83K subscribers
456 photos
52 videos
37 files
644 links
برگزاری دوره های آموزش برنامه نویسی و امنیت نرم افزار.

https://dword.ir
@YMahmoudnia
Download Telegram
#Article #MalwareReport

📗Malware Analysis Report
By: Network Intelligence
Pages: 20
Language: EN
Pub Date: —

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareReport

📗Trojan.W32.KRBanker.96710
By: nProtect, Inc.
Pages: 4
Language: EN
Pub Date: 2015

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareReport

📗W64Regin, Stage #1
By: F-Secure
Pages: 17
Language: EN
Pub Date: —

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareReport

📗TrojanWin32Sirefef.P
By: Kindsight Inc.
Pages: 6
Language: EN
Pub Date: 2012

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #Exploiting

Security Sift Windows Exploit Development

Part 1: The Basics
Part 2: Intro to Stack Based Overflows
Part 3: Changing Offset and Rebased Modules
Part 4: Locating Shellcode with Jumps
Part 5: Locating Shellcode with Egghunting
Part 6: SEH Exploits
Part 7: Unicode Buffer Overflows

🌐 Website

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #Exploiting

Windows Exploit Development Tutorial Series
Windows Heap Exploitation
Linux Exploit Development Tutorial Series

🌐 Website

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #Exploiting

Corelan Exploit writing tutorial

part 1 : Stack Based Overflows
part 2 : Stack Based Overflows – jumping to shellcode
part 3 : SEH Based Exploits
part 3b : SEH Based Exploits – just another example
part 4 : From Exploit to Metasploit – The basics
part 5 : How debugger modules & plugins can speed up basic exploit development
part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
part 7 : Unicode – from 0x00410041 to calc
part 8 : Win32 Egg Hunting
part 9 : Introduction to Win32 shellcoding
part 10 : Chaining DEP with ROP – the Rubik’s[TM] Cube
part 11 : Heap Spraying Demystified

🌐 Website

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareAnalysis #Assembly

مجموعه آموزش Assembly Language - Basic Malware Reverse Engineering توسط Kevin M. Thomas که در لینکدین به اشتراک گذاشته شده به زودی به صورت PDF در کانال قرار خواهد گرفت.

🌐 Website

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareAnalysis

Malware Analysis Tutorials: a Reverse Engineering Approach

Tutorial 1- A Reverse Engineering Approach (Lesson 1: VM Based Analysis Platform)
Tutorial 2- Introduction to Ring3 Debugging
Tutorial 3- Int 2D Anti-Debugging .
...
Tutorial 33: Evaluation of Automated System I (Anubis)
Tutorial 34: Evaluation of Automated Tools CWSandBox, PeID, and Other Unpacking Tools

🌐 Website

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #ReverseEngineering

Reverse Engineering Malware 101

Introduction
1) Fundamentals
2) Malware Techniques
3) RE Tools
S4) Triage Analysis
5) Static Analysis
6) Dynamic Analysis

🌐 Website

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareReport

📗Stuxnet
By: AmrThabet
Pages: 29
Language: EN
Pub Date: 2011

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
#Article #MalwareAnalysis

📗Introduction to Malware Analysis Techniques
By: Florian H¨aber
Pages: 74
Language: EN
Pub Date: 2015

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM