Welcome to the series focused on runtime linking using the PEB and PE structures. This is a foundational course that anyone reversing Windows binaries, to include shellcode, will need to be familiar with. The first video in this series introduces you to the sample we'll be using to study these techniques and shows how this technique can make analyzing malware more difficult.
Course material can be found at: https://www.thecyberyeti.com/training
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
🎓 Courses on Pluralsight 👉🏻 https://www.pluralsight.com/authors/josh-stroschein
🌶️ YouTube 👉🏻 Like, Comment & Subscribe!
🙏🏻 Support my work 👉🏻 https://patreon.com/JoshStroschein
🌎 Follow me 👉🏻 https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
⚙️ Tinker with me on Github 👉🏻 https://github.com/jstrosch
🤝 Join the Discord community and more 👉🏻 https://www.thecyberyeti.com