|
@ghidraninja | |||||
|
Finally released part 2 of my »Reversing #WannaCry with #Ghidra« series!
In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.
youtube.com/watch?v=Q90uZS…
|
||||||
|
||||||
|
FraggleRock613
@schuran
|
2. velj |
|
I really enjoy your videos. The Wyze camera has been eye opening
|
||
|
|
||
|
Ghidra Ninja
@ghidraninja
|
2. velj |
|
Thanks! Glad you enjoyed it!
|
||
|
|
||
|
Sythez
@Sythez2
|
2. velj |
|
Love it, thanks again for making these videos!
|
||
|
|
||
|
Ghidra Ninja
@ghidraninja
|
2. velj |
|
Thank you! Appreciate it!
|
||
|
|
||
|
Silke Holtmanns
@SHoltmanns
|
3. velj |
|
cool. did you already started some thinking on how to use ghidra for detection of morphed malware? I.e. introducing a new distance measure for function calls etc.
|
||
|
|
||
|
Ghidra Ninja
@ghidraninja
|
3. velj |
|
The problem is that you really want an integrated debugger and do some live analysis for this - so hoping for the debugger release :)
|
||
|
|
||
|
Хьюго
@HHUG0
|
2. velj |
|
yeah finaly 😍
|
||
|
|
||
|
Marius 'f0wL' Genheimer
@f0wlsec
|
2. velj |
|
Well done! :D
|
||
|
|
||
|
Mike West - OSCP
@mwest67
|
3. velj |
|
Awesome videos so far! Nice pace to them!
|
||
|
|
||