Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile
Josh Stroschein | The Cyber Yeti

@jstrosch

Reverse engineer at FLARE/@Google | @pluralsight author | 800K+ views on YT 😱 Find FREE resources below👇

ID: 53809084

linkhttps://thecyberyeti.com calendar_today05-07-2009 01:40:42

4,4K Tweet

10,10K Followers

985 Following

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

Reverse engineering binary code is a core skill for software security, malware analysts and penetration testers. Check out my course on Pluralsight, we'll study everything from assembly basics (intel x86) to working with debuggers and disassemblers! 👉 pluralsight.com/courses/revers…

Reverse engineering binary code is a core skill for software security, malware analysts and penetration testers. Check out my course on <a href="/pluralsight/">Pluralsight</a>, we'll study everything from assembly basics (intel x86) to working with debuggers and disassemblers!

👉 pluralsight.com/courses/revers…
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

If you're looking to practice your #malware #analysis skills, I have several exercises available: 🎓 github.com/jstrosch/malwa… These include challenge tasks and detailed walk-throughs. You'll also find them as CTF challenges at CyberDefenders®™ 👉 cyberdefenders.org/blueteam-ctf-c…

If you're looking to practice your #malware #analysis skills, I have several exercises available:

🎓 github.com/jstrosch/malwa…

These include challenge tasks and detailed walk-throughs. You'll also find them as CTF challenges at <a href="/CyberDefenders/">CyberDefenders®™</a> 

👉 cyberdefenders.org/blueteam-ctf-c…
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

If you're looking to get started in #malware #analysis or #reverse #engineering, consider checking out my YouTube channel, I videos covering a wide range of topics! 🤔 youtube.com/@jstrosch/

If you're looking to get started in #malware #analysis or #reverse #engineering, consider checking out my <a href="/YouTube/">YouTube</a> channel, I videos covering a wide range of topics!

🤔 youtube.com/@jstrosch/
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🚨 Do you know about the AddressOfEntryPoint field in the PE file and how it relates to finding "main"? If not, this video is for you! youtu.be/sGPmh_5kwkw #pe #malware #cybersecurity

Suricata IDS/IPS (@suricata_ids) 's Twitter Profile Photo

Happening today, September 11th, 6 pm UTC catch a webinar on Crafting Custom Yara Rules for Ransomware Detection with Dr. Josh Stroschein | The Cyber Yeti & cyber_panch. This #FreeWebinar is a precursor to the upcoming 2-day workshop they’re giving at #Suricon. Register now! us02web.zoom.us/webinar/regist…

Happening today, September 11th, 6 pm UTC catch a webinar on Crafting Custom Yara Rules for Ransomware Detection with Dr. <a href="/jstrosch/">Josh Stroschein | The Cyber Yeti</a> &amp; <a href="/cyberpanch/">cyber_panch</a>. This #FreeWebinar is a precursor to the upcoming 2-day workshop they’re giving at #Suricon.

Register now! us02web.zoom.us/webinar/regist…
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🔥 Don't miss today's stream with Peter Manev (pevma) as we chat about network security monitoring, threat hunting and who knows what else! Join at 12pm CDT 👉 youtube.com/live/z621gAaUR…

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🚨 Miss last weeks stream with Karsten Hahn (Karsten Hahn)? You can catch it here 👇 youtube.com/live/3UzTbOlA9… We discuss techniques for identifying benign/clean files, an often overlooked aspect of #malware #analysis!

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🔥 Creating structures (or structs) in #idapro can help ease your reverse engineering efforts by adding clarity to how memory is used. Here is a three-video playlist discussing how to create them👇 youtube.com/playlist?list=…

Tetsuo - c/asm (@7etsuo) 's Twitter Profile Photo

Binary Ninja integrates TTD via WinDbg Install WinDbg through BN, record trace, open target and trace in BN. Full WinDbg cmd's (g, p, t, g-, p-, t-) Extract coverage with 0vercl0k's codecov.js in WinDbg, import to BN. Instant visual of executed code! seeinglogic.com/posts/binary-n…

BlueEye (@blueeye46572843) 's Twitter Profile Photo

I created a new repo where I will be uploading fully annotated IDBs of interesting samples that I analyzed, check out my fully annotated IDB for APT41 StealthVector. github.com/Blu3Eye/Malwar…

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

The Flare-On Challenge is back for its 11th year! 🔥 This #CTF-style challenge for current and aspiring reverse engineers features puzzles across Windows, Linux, Web3, and even YARA. Learn more and get ready to compete → bit.ly/3TwZ7AG #Flareon11

The Flare-On Challenge is back for its 11th year! 🔥 

This #CTF-style challenge for current and aspiring reverse engineers features puzzles across Windows, Linux, Web3, and even YARA. 

Learn more and get ready to compete → bit.ly/3TwZ7AG

#Flareon11
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🚨 Want to learn 3 key detection technologies? In Malicious Activity Detection you will learn how create custom signatures for #suricata, #yara and #sigma 👇 ✅ pluralsight.com/courses/malwar… This continues the malware skill path, where you can learn triage and reversing skills.

🚨 Want to learn 3 key detection technologies? In Malicious Activity Detection you will learn how create custom signatures for #suricata, #yara and #sigma 👇

✅ pluralsight.com/courses/malwar…

This continues the malware skill path, where you can learn triage and reversing skills.
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

🚨 This playlist covers analysis that I wasn't able to squeeze into my #Defcon32 workshop. I'll cover several topics related to #Lockbit's anti-analysis techniques, to start we'll cover builder basics and generate the ransomware binaries: youtube.com/playlist?list=…