Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Welcome to Packers Part 4. In this module, we'll demonstrate an example to unpack a malware code. We'll use UPX Packed Regshot and take a look at the strings, before and after the packing. We'll also explain how to manually unpack UPX, dump the process, and reconstruct the Import Address Table (IAT).