Feb. 23, 2023, 3 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

Crafting custom Yara rules is a key capability for anyone working in cyber security. In this video, the final part of the Nullmixer Technical Analysis series, we'll look into detecting Nullmixer with Yara and use tools like IDA Pro and Strings to identify strings, understand their context and use them to create a Yara rule of the unpacked binary. We'll also discuss testing methods and caveats with this rule.

00:00 Introduction
01:08 Using IDA To Find String Context
03:59 Using …

analysis binary context cyber cyber security discuss ida ida pro identify introduction key pro rules security series strings technical technical analysis testing tools understand video working yara yara rules

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC