This is How You Hunt For Malware
📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training 💵 Support the Channel: You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more! ☕️ Buy Me Coffee: https://www.buymeacoffee.com/nahamsec JOIN DISCORD: https://discordapp.com/invite/ucCz7uh 🆓 🆓 🆓 $200 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 💬 Social Media - https://twitter.com/nahamsec - https://instagram.com/nahamsec - https://twitch.com/nahamsec - https://facebook.com/nahamsec1 Timestamps ------- 00:00 Introduction 00:02 Learning the basics of malware analysis and hunting. 01:56 Malware can be delivered through various methods. 05:48 Exploring the dark web for potential malware sources. 07:48 Exploring different types of malware on the dark web 11:58 Tracking malware creators through signatures 13:53 Exploring malware samples using virtual machines and different operating systems. 18:00 Identifying and tracking malware through indicators of compromise 19:56 Identifying and reporting vulnerable system to Steam 23:42 Analysis of malware distribution source 25:38 Identifying infected files communicating with specific domains 29:24 Accessing and analyzing malware samples using online resources 31:29 Use tools like WireShark and Joe Sandbox for malware analysis. 35:00 Examining malware's activities and potential impact 36:52 Investigating if a program is potentially a cleaner or malware. 40:30 Analyzing network traffic and identifying potential security threats. 42:22 Understanding the safe sandbox for malware hunting
📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training 💵 Support the Channel: You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more! ☕️ Buy Me Coffee: https://www.buymeacoffee.com/nahamsec JOIN DISCORD: https://discordapp.com/invite/ucCz7uh 🆓 🆓 🆓 $200 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 💬 Social Media - https://twitter.com/nahamsec - https://instagram.com/nahamsec - https://twitch.com/nahamsec - https://facebook.com/nahamsec1 Timestamps ------- 00:00 Introduction 00:02 Learning the basics of malware analysis and hunting. 01:56 Malware can be delivered through various methods. 05:48 Exploring the dark web for potential malware sources. 07:48 Exploring different types of malware on the dark web 11:58 Tracking malware creators through signatures 13:53 Exploring malware samples using virtual machines and different operating systems. 18:00 Identifying and tracking malware through indicators of compromise 19:56 Identifying and reporting vulnerable system to Steam 23:42 Analysis of malware distribution source 25:38 Identifying infected files communicating with specific domains 29:24 Accessing and analyzing malware samples using online resources 31:29 Use tools like WireShark and Joe Sandbox for malware analysis. 35:00 Examining malware's activities and potential impact 36:52 Investigating if a program is potentially a cleaner or malware. 40:30 Analyzing network traffic and identifying potential security threats. 42:22 Understanding the safe sandbox for malware hunting