MALWARE ANALYSIS // How to get started with John Hammond

MALWARE ANALYSIS // How to get started with John Hammond

The amazing John Hammond tells us how to get into Malware Analysis. Learn about jobs, what you need to know and much more!

Pretty sketchy stuff! 0:00
Welcome John Hammond: 0:37
Don’t divide cyber in your mind: 0:53
John’s day job: 2:00
Hacker’s crafty methods: 3:17
Will AI take jobs away? 4:02
How do I become like you? 4:55
Windows is very important: 5:35
Malware vs CTFs: 6:12
Is Malware mainly on Windows systems? 6:32
Always comes back to the same thing: 7:28
Practical Example: 8:50
John’s setup: 9:29
Python malware example: 11:42
Malware code: 12:50
Bad guys can sell this information: 15:50
But this is in the clear? 16:30
Obfuscated version: 17:14
Real world? Don’t want to touch disk: 18:28
How do I find this stuff: 19:50
Weird Spam SMS messages: 20:58
Real World: Finding malware: 21:30
John’s real world company example: 23:42
Real world logic to find malware: 24:20
Detectors: 25:23
Hunting malware: 25:48
Use your eyes – don’t trust an automated systems: 26:25
Input from other systems: 27:15
How do I become like you? 27:49
What kind of skills would you look for in a person to get a job: 28:00
Look at malware sites: 29:24
Build out a library: 30:15
David pushes John for a job on LinkedIn: 30:38
How did John get his job? 33:05
Use social media: 33:30
How John got his first job: 34:31
It’s who you know, not what you know: 35:55
How John got his current job: 36:30
Would you hire someone with certs; or someone you know: 38:19
Windows bat script example: 39:50
Which languages does John know: 45:08
How do you know if it is good or bad code? 45:38
Office Macros Malware Example: 46:45
Cool Linux command: 50:40
Is this a good job? Are there lots of job? 51:26
What hours do you work? 52:30
Any books you recommend? 53:31

John Hammond Playlist:

Web Sites mentioned:
Use at your own risk:
Malware Bazaar:
Joe Sandbox:
Any run:

The IDA Pro Book:
Black Hat Go: Go Programming For Hackers and Pentesters:
Black Hat Python: Python Programming for Hackers and Pentesters:
Python Pocket Reference
Linux Pocket Guide: Essential Commands:
Regular Expression Pocket Reference:
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali:

Connect with me:
​ Twitter:

Support me:
Join thisisIT:
​ Or, buy my CCNA course and support me: CCNA ($10):
​ Udemy CCNA Course:
GNS3 CCNA Course: CCNA ($10):

Connect with John:

malware analysis
cybersecurity jobs
ethical hacking
hacking jobs
john hammond
hack the box
try hack me
cyber security career
cybersecurity careers
oscp certification
ctf for beginners
first job
cybersecurity job

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#malware #hacking #cybersecurity