In this video from our Reverse Engineering with Ghidra online course you will see how a behavioral analysis of a malware is performed. The malicious sample in this exercise utilizes a technique called process hollowing, making it even more interesting. Dive in!
- Blog2022.03.28Footprinting Firewalls | Reconnaissance Tutorial [FREE COURSE CONTENT]
- Blog2022.03.17Process Hollowing Malware | Reverse Engineering Tutorial [FREE COURSE CONTENT]
- Blog2022.03.09Sniffing BLE packets | IoT Hacking Tutorial [FREE COURSE CONTENT]
- Blog2022.02.18Pass The Hash Attacks in Active Directory [FREE COURSE CONTENT]