abhijit mohanta (@abhijit_mohanta) 's Twitter Profile
abhijit mohanta

@abhijit_mohanta

Author: "Malware Analysis and Detection Engineering" and "Preventing Ransomware" . Malware Researcher

ID: 56427439

linkhttp://dreamofareverseengineer.blogspot.in/ calendar_today13-07-2009 17:02:58

62 Tweet

226 Followers

989 Following

abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

Can we combine freely available RE tools for better results. Ollydbg Debugger with Ghidra Decopiler. Know how. Join my onsite training at x33fcon Poland “. "Malware Reverse Engineering Made Easy". x33fcon.com/#!t/reveng.md

/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

Learn to reverse engineer diverse techniques employed by malware and become an expert in #malware #analysis with our #training "Malware Reverse Engineering Made Easy" by abhijit mohanta. Join us now! x33fcon.com/#!t/reveng.md #RevEng #windows #cybersecurity #handson

Learn to reverse engineer diverse techniques employed by malware and become an expert in #malware #analysis with our #training "Malware Reverse Engineering Made Easy" by <a href="/abhijit_mohanta/">abhijit mohanta</a>. Join us now! 
x33fcon.com/#!t/reveng.md
#RevEng #windows #cybersecurity #handson
abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

Join my in-person training at xx3fon, Poland. Details :lnkd.in/gw6dxs3n . Here are glimpse of a some animations, I would be using my training: Disassembler working: youtube.com/watch?v=QKsIAS… PE mapping: youtube.com/watch?v=iyV0y-… Code injection: youtube.com/watch?v=1L5SB_…

DEF CON (@defcon) 's Twitter Profile Photo

#defcontraining Las Vegas Spotlight Join abhijit mohanta for "Malware Reverse Engineering Made Easy" training.defcon.org for info and registration From the abstract: The training starts with basics of computer architecture, assembly language, code

abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

What's there in my "Malware Reverse Engineering Made Easy" training at Defcon, Las Vegas, Aug 14,15. medium.com/@abhijit.mohan…

What's there in my "Malware Reverse Engineering Made Easy" training at Defcon, Las Vegas, Aug 14,15. medium.com/@abhijit.mohan…
abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

If you observe the top malware families today AgentTesla, LokiBot, Formbook, DCRAT ... would be having information stealer and password harvester modules. I have composed a quick video to identify stealers and analyze them. Link: youtu.be/4VXQK-N9Pyk

abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

If you are interested in Reverse Engineering malwares join my training. full details : linkedin.com/feed/update/ur…. Fill the google form if you are interested. docs.google.com/forms/d/1rIut2…

If you are interested in Reverse Engineering malwares join my training.  full details : linkedin.com/feed/update/ur…. Fill the google form if you are interested.
docs.google.com/forms/d/1rIut2…
abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

If you to start analyzing a Malware, identifying the 🗄 "File format" one of the first steps. watch the video of how file format can help you in analysis youtube.com/watch?v=2rCJZ-…

abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

join my "Advanced Windows Malware Reverse Engineering" at Blackhat EMEA blackhatmea.com/trainings-list… Course Overview: youtube.com/watch?v=qrW6vd… Topics: RE Ransomwares, Lockbit, POS Malwares, .net , Golang Malwares

abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

Interested in Learning "Malware Reverse Engineering" course: Malware Reverse Engineering: Beginner to Advanced 𝐅𝐮𝐥𝐥 𝐜𝐨𝐮𝐫𝐬𝐞 𝐒𝐲𝐥𝐥𝐚𝐛𝐮𝐬: rb.gy/it2xws price - 375 USD/30,000 INR (excluding taxes) fill :rb.gy/h7b620 #Malware #training #Ransomwar

abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

𝐌𝐚𝐥𝐰𝐚𝐫𝐞 𝐑𝐞𝐯𝐞𝐫𝐬𝐞 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠 : 𝐁𝐚𝐬𝐢𝐜 𝐭𝐨 𝐀𝐝𝐯𝐚𝐧𝐜𝐞𝐝 𝐰𝐢𝐭𝐡 𝐃𝐞𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠 𝐖𝐄𝐁𝐒𝐈𝐓𝐄: lnkd.in/gaa-g8H8 𝐕𝐈𝐃𝐄𝐎 𝐒𝐘𝐋𝐋𝐀𝐁𝐔𝐒: lnkd.in/gn7J8-kh

abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

Static Dynamic Analysis Definition in 10 secs Learn Malware analysis and Reverse Engineering with fun lnkd.in/gaa-g8H8 #MalwareAnalysis #ReverseEngineering

abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

Malware Reverse Engineering + Detection Engineering + Malware Dev Training (LIVE + On-Demand) academy.intelliroot.com covers Ransomware Reverse Engineering #Ransomware #Malware #Reversing #APT

Malware Reverse Engineering + Detection Engineering + Malware Dev Training (LIVE + On-Demand) academy.intelliroot.com covers Ransomware Reverse Engineering #Ransomware #Malware #Reversing #APT
abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

Does assembly language or reading disassembly scare you from becoming a Malware Reverse Engineer. Here's a tip to read Disassembly. More at academy.intelliroot.com

abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

Debug .net Malware DLL's use DNSpy with RunDotNetDll 1)Start DNSpy and load RunDotDll. Arguments in DNSpy should be dllName,MethodName 2)Run once -> See the modules loaded in DNSpy. The malware DLL should be loaded 3)Set Class breakpoints in the DLL to breakpoint the methods. .

Debug .net Malware DLL's
use DNSpy with RunDotNetDll 
1)Start DNSpy and load RunDotDll. Arguments in DNSpy should be dllName,MethodName
2)Run once -&gt; See the modules loaded in DNSpy. The malware DLL should be loaded 
3)Set Class breakpoints in the DLL to breakpoint the methods. .
abhijit mohanta (@abhijit_mohanta) 's Twitter Profile Photo

🔴 Red Team Experiment – Man-in-the-Browser (MitB) Attack Hooked InternetReadFile() via DLL injection in Internet Explorer to intercept traffic — just like banking trojans do. 👨‍💻 github.com/amohanta/Red_T… #redteam #Malware #banking