Malware Analysis Tools YOU COULD USE

Malware Analysis Tools YOU COULD USE

The PC Security Channel

6 месяцев назад

56,582 Просмотров

Malware analysis tools for 2024: I look at some up and coming malware analysis tools everyone can use like Triage, Capa and ActivityView. Whether you want to do system forensics or binary reverse engineering, you'll find one of these quite useful. Get NordVPN (discounted) : https://nordvpn.com/tpsc (sponsor)

Buy the best antivirus: https://thepcsecuritychannel.com/best-antivirus
Join the discussion on Discord: http://discord.tpsc.tech/
Get your business endpoints tested by us: http://tpsc.tech/
Contact us for business: https://thepcsecuritychannel.com/contact

Тэги:

#The_PC_Security_Channel #TPSC #cybersecurity #cyber_security #computer_security #internet_security #antivirus #anti_malware #ransomware #trojan #virus #PUP #best_antivirus #best_internet_security #learn_cybersecurity #hacking #hack #security #technology #cyber_insurance #cybersecurity_degree #best_EDR #EDR #malware_analysis_tools #capa #triage #malware_analysis #best_malware_analysis_tools
Ссылки и html тэги не поддерживаются


Комментарии:

@projectzsavage
@projectzsavage - 26.03.2024 19:20

how to acces triage vms?

Ответить
@DdragonGun001
@DdragonGun001 - 23.03.2024 22:36

Some tools I use are Capa, bstrings, procmon, pestudio, and running things on inetsim

Ответить
@AlexAlex-869
@AlexAlex-869 - 29.02.2024 01:03

Super cool!

Ответить
@luddedagoat3599
@luddedagoat3599 - 27.02.2024 20:20

Can i get infected from seeing the live sandbox and get it on my main pc.

Ответить
@samfisher5302
@samfisher5302 - 26.02.2024 07:27

Great video! Thank you!

Ответить
@TFRdaitoo
@TFRdaitoo - 21.02.2024 23:50

Can a virus jump over triage? (To your pc?)

Ответить
@freezeadq8748
@freezeadq8748 - 13.02.2024 08:19

but any of these tools can anylize a simple encrypted .luac file...

Ответить
@adamion1993
@adamion1993 - 02.02.2024 02:04

He has very good info but the vpn bullshit is annoying, I get that for a channel that is about cybersec there aren't many sponsor options but cmon a vpn doesn't do anything...encryption this encryption that literally every site is "peer to peer encrypted" or whatever their buzzword is it has never stopped anyone from doing anything ever...great advice but I see vpn ads everywhere and it's just disheartening

Ответить
@tienatnguyen3412
@tienatnguyen3412 - 28.01.2024 17:38

Do we have any ransomware Stop djvu online ID solutions ?

Ответить
@robloxfan4271
@robloxfan4271 - 22.01.2024 21:40

don't forget virus total

Ответить
@youtubeuser6067
@youtubeuser6067 - 22.01.2024 13:03

We need a Free Open Source AI-based malware detector/remover. But, then intelligence agencies would be exposed.

Ответить
@michaell7877
@michaell7877 - 22.01.2024 04:53

I like your vids. Quite often it’s over my head. I would like to learn how as a beginner of trying to protect my pc from outside hacks. What do you suggest how I get started? Do you have a video on how to start out? Tyvm.

Ответить
@azizgoi2066
@azizgoi2066 - 22.01.2024 04:19

How do we know if our computer is infected with malware stealer which is 100% FUD?

Ответить
@shadowstorm657
@shadowstorm657 - 17.01.2024 21:14

Amazing video thank you

Ответить
@lussor1
@lussor1 - 16.01.2024 23:32

You got sponsored by the scummy Nord, but hopefully the viewers know that the VPN is bad

Ответить
@nemtudom5074
@nemtudom5074 - 15.01.2024 19:49

Hey!

I was browsing the internet and i came upon ClamAV claiming to be an open source AV solution, and according to its wikipedia page it has a detection rate of 59%

Could you test it if its actually true?

Ответить
@KonuralpBalcik
@KonuralpBalcik - 15.01.2024 03:20

There are only 2 viruses in Windows, one is Edge and the other is Defender, no matter how much you delete and block them, they download and install themselves without asking anything. 🤣

Ответить
@m6yki_
@m6yki_ - 14.01.2024 13:42

Ahh yess, this is a great video. But TPS, how do we know what is a walware or what executable is a malware?

Ответить
@jesusivanguerrazaldivar8303
@jesusivanguerrazaldivar8303 - 13.01.2024 05:47

Wow ! new for me, thanks !

Ответить
@hoteny
@hoteny - 13.01.2024 00:20

My friend got his many accs stolen somehow, instagram shows no logs of ips while steam showed morocco. So, we think its his google chrome cookies and possibly account (but no session exists outside his own devices as we checked), not passwords though?, but maybe the pc itself was controlled? So anyway, since he cant format rn, we had to just use many tools you mentioned. We dont know if this is enough. Do you think we should do anything extra?

Ответить
@Wahinies
@Wahinies - 12.01.2024 23:09

Yooo this is an amazing example of enhancing the global security posture by educating. Thank you for this set!

Ответить
@onegenius6390
@onegenius6390 - 12.01.2024 22:53

HEY, HOW ABOUT LINKS TO THESE TOOLS? 🤔

Ответить
@Orblets
@Orblets - 12.01.2024 19:09

Bro I was looking for something exactly like last activity view today and couple hours later this video shows in my recommended. Thank you!

Ответить
@godbacchus
@godbacchus - 12.01.2024 19:09

15 hackers have seen this video so far... lol 👎

Ответить
@niamotullah99
@niamotullah99 - 12.01.2024 12:11

Running Malware analysis tool into a Malware

Ответить
@gamereditor59ner22
@gamereditor59ner22 - 12.01.2024 08:22

Nice!! Where can I get it?

Ответить
@unguidedone
@unguidedone - 11.01.2024 22:22

if your looking at a executable then the tool of choice is ghidra. you can also use ida pro if on windows or reflector. if your looking at network activity then wireshark works fine.

i am disappointed at the videos lack of technical ability and this is coming from someone who has very basic computer ability skills 2/10 lol.

Ответить
@alexxx4434
@alexxx4434 - 11.01.2024 21:33

Nir Soft freeware system tools are great! Been using them a long time.

Ответить
@wolfbrave4866
@wolfbrave4866 - 11.01.2024 21:20

Imagine one day you sent a sample that could breach through the Sandbox environment. 🤔

Ответить
@dismalbreadmaps
@dismalbreadmaps - 11.01.2024 15:46

Mandient is owned by Google

Ответить
@HoshangGovil
@HoshangGovil - 11.01.2024 15:43

I have learnt a lot from you and will be learning more in the future.

Thank you!

Ответить
@lewiskelly14
@lewiskelly14 - 11.01.2024 14:07

How can I trust you with that choice of sponsor and you don't bother to link the software and websites you talk about in the description?

Ответить
@HikaruAkitsuki
@HikaruAkitsuki - 11.01.2024 13:28

My main Working Station is Virtual Machine. I refuse to do my activity on Bare Metal. VM is easy to deal if there is something went wrong. You can just Snapshot it or delete entirely and install a fresh one.

Ответить
@Nick41622
@Nick41622 - 11.01.2024 12:42

You don't need a third-party antivirus. It is far more important to update your PC & browser. This is your first line of defence. Windows security is all you need. You don't need none of this shit!

Ответить
@richardh9071
@richardh9071 - 11.01.2024 12:26

Great suggestions Leo. Other tools that I use when performing static analysis are Floss (FLARE Obfuscated String Solver) - which is like 'strings' on steroids. It can find encrypted/encoded strings and decode them, find interesting strings automatically (without having to grep specifically for them).
010 Editor (or WinHex, or any other hex editor) can be useful also, particularly when analysing samples that are XORed (you can find the XOR key by viewing the sample in a hex editor)
CyberChef also very useful for dealing with encoding/obfuscation.
PEiD, DIE, CFF Explorer are also valuable when analysing packed malware.
Process Explorer, Process Monitor, Fakenet, etc all good for dynamic analysis
Memory dumping, and analysis with volatility can be incredibly valuable too.
And last but not least, dnSpy, Ghidra and IDA pro for when you want to have a real headache and nothing else is working!

Ответить
@CaptainMC554
@CaptainMC554 - 11.01.2024 10:33

Leo

Ответить
@AgonTheFirst
@AgonTheFirst - 11.01.2024 09:56

Hello, how to analyze dll file. with cape... Example: Some software basically has nothing until they download a DLL file to perform their task.

Ответить
@truefeelings7
@truefeelings7 - 11.01.2024 09:54

i used this tool for manipulating my frnds not in bad way ... installed on his laptop 🤣🤣 7 years back 1st tool

Ответить
@ARabdurrahmanar
@ARabdurrahmanar - 11.01.2024 08:24

Nice🥰

Ответить
@janmillerty4528
@janmillerty4528 - 11.01.2024 08:23

Leo

Ответить
@ayush0477
@ayush0477 - 11.01.2024 08:10

Leo

Ответить
@FurryNonsense
@FurryNonsense - 11.01.2024 07:41

I wish there was a website that just said what the virus did (steal passwords, lock you out of your computer, etc) instead of a bunch of random codes and saying "yeah, this is bad, but we're not gonna say why this is bad"

Ответить
@lukehjo
@lukehjo - 11.01.2024 05:14

Process Monitor but worse.

Ответить
@Thedude897
@Thedude897 - 11.01.2024 03:43

This dude called the security channel is seriously plugging nord

Ответить
@WololoWololo2
@WololoWololo2 - 11.01.2024 03:07

Leo

Ответить