Obfuscation Techniques For AntiVirus Evasion | TryHackMe Obfuscation Principles
📄 Cyber Security Certification Notes & Cheat Sheets https://buymeacoffee.com/notescatalog/extras 🚀(2nd link) Cyber Security Certification Notes & Cheat Sheets https://shop.motasem-notes.net/collections/cyber-security-study-notes 💡Cyber Security Notes | Membership Access https://buymeacoffee.com/notescatalog/membership 🧩Cybersecurity Direct Coaching & Mentoring https://shop.motasem-notes.net/collections/coaching-and-mentoring-programs 🔥Download FREE Cyber Security 101 Study Notes https://buymeacoffee.com/notescatalog/e/290985 🧠 Get Strategic cyber security and tech insights weekly to your email by joining my newsletter below https://buymeacoffee.com/notescatalog/membership 📊Blog Writeups https://www.motasem-notes.net **** In this video walk-through, we covered the first part of obfuscation techniques and principles for signature and AV evasion where we focused on object concatenation. ********** Writeup https://motasem-notes.net/obfuscation-techniques-for-antivirus-evasion-tryhackme-obfuscation-principles/ ******* Layered Obfuscation Taxonomy | Research Paper https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00049-3.pdf ************* Store https://buymeacoffee.com/notescatalog/extras Patreon https://www.patreon.com/motasemhamdan LinkedIn [1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/ [2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/ Instagram https://www.instagram.com/motasem.hamdan.techl/ Google Profile https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6 Twitter https://twitter.com/ManMotasem Facebook https://www.facebook.com/motasemhamdantty/ ****** 0:00 - Introduction to Obfuscation Techniques 0:12 - Overview of Obfuscation Principles and Signature Evasion 0:40 - Steps to Start Learning Obfuscation 1:00 - Definition of Obfuscation 1:11 - Recommended Reading for Obfuscation 1:42 - Key Concepts of Obfuscation 2:12 - Obfuscation Process Explained 3:00 - Goals of Obfuscation: Protecting Intellectual Property 4:03 - Obfuscation in Software Development 5:00 - Role of Obfuscation in Signature Evasion 6:01 - Taxonomy of Obfuscation Techniques 7:01 - Focus on Code Element Layer 7:40 - Methods for Data Obfuscation 8:20 - Techniques: Array Transformation, Data Encoding, and More 10:05 - Concatenation Example in Programming 12:11 - Concatenation in Different Programming Languages 13:11 - Practical Example: Powershell Code Obfuscation 14:10 - Identifying Problematic Code for Antivirus Detection 15:14 - Applying Concatenation for Obfuscation 16:35 - Testing the Obfuscated Code 17:02 - Exploring Additional Obfuscation Techniques
Download
1 formatsVideo Formats
Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.