March 10, 2023, 7 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

Malware authors will often abuse file formats to complicate analysis and adding unnecessary data is one way to do this. This bloat can disrupt analysis and prevent these malicious files from being detected. In this video, we'll explore how malware authors add unnecessary data to PE files by using the overlay. We'll also explore how the data they choose to use compresses well and allows them to distribute relatively small archive files. We'll then use a hex-editor to remove this …

abuse analysis authors data disrupt editor file files hex malicious malware overlay video

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India

Cyber Program Manager - CISO- United States – Remote

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700

Network Security Engineer (AEGIS)

@ Peraton | Virginia Beach, VA, United States

SC2022-002065 Cyber Security Incident Responder (NS) - MON 13 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Information Systems Security Engineer

@ Booz Allen Hamilton | USA, GA, Warner Robins (300 Park Pl Dr)