Jump to content

Petra835

Members
  • Content Count

    1
  • Joined

  • Last visited

Everything posted by Petra835

  1. One can find the complete version of many of those courses here: [Hidden Content] All this is taken from an old thread on this forum. Mine is just a reminder. NOTE: The original thread is a little chaotic so I extracted the information still relevant, otherwise I would've linked that thread instead.
  2. Petra835

    -za-

    The 39:20 minute video is the 3rd video. The 3rd video is present in the file but it's a repetition of the 2nd one IIRC. Just overwrite the 3rd in the archive with the 39:20 minute one. The 26th is still missing.
  3. I don't know if people read old threads here, but I just wanted to say that SANS FOR610 2020 is fine. It goes from basic to intermediate stuff. It starts with behavioral analysis and then, starting with day 2, moves to actual reverse engineering. I'm not aware of any advanced course, honestly. I thought "Zero 2 Automated" was advanced because of the "Automated" term in its title, but it turns out it's not the kind of automated I had in mind. I was thinking about customizing and extending debuggers and disassemblers, performing symbolic execution and taint analysis, but it's nothing of that sort. One can still learn this stuff the hard way though: by reading papers!
  4. Thank you for sharing this! The archives are password protected, though. What's the password?
  5. My only problem with telegram is that I don't want to give my phone number. I tried several temporary ones but the ones that worked had already been used.
  6. What I don't like about mega is that they can partially delete a folder so one has to check to make sure everything is still there. Also, there's a quota so free users with a static IP are out of luck.
  7. Don't be lazy. There's even a link to amazon in the opening post. The description there says it's for beginners.
  8. As others have said, usually, C, C++, assembly, but, in general, it depends on the malware. If a malware is written in a language X and it's interpreted, then you need to know X. If it's compiled to some kind of machine language Y, then you need to know Y. For general reverse engineering, I can recommend 2 advanced books: Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly These books will either fascinate or scare you away.
  9. I wouldn't count on that. He/she says: "Buy Long-term Premium Accounts To Support Me & Max Speed".
  10. Just remove the trailing [/hide] from the url.
×
×
  • Create New...