Video Description

Welcome to Packers Part 4. In this module, we'll demonstrate an example to unpack a malware code. We'll use UPX Packed Regshot and take a look at the strings, before and after the packing. We'll also explain how to manually unpack UPX, dump the process, and reconstruct the Import Address Table (IAT).

Course Modules