Viruses and Trojans
Malwares are the most prized weapons of attackers as they provide extraordinary capabilities in accessing infected systems and networks. With over a million new malware variants released every six months on the internet and a few dozen anti-virus companies to defend against them, the battle among the enterprise and the attackers is constantly increasing in complexity. A good understanding of various malwares such as viruses, Trojans, worms, rootkits, botnets etc is essential to allow a professional in handling a compromised system. While use of malwares in a penetration testing assignment is unconventional, it should not be prohibited as it is the only way to test the effectiveness of deployed anti-measures.
M7
Sussy-droper-three
M7
Sussy-droper-two
M7
Sussy-droper-one
M7
Procmon Newbie
M7
Detection-II
M7
Detection-I
M7
Parent
M7
Polyglot
M7
Entrofin
M7
Hidell
M7
Last day
M7
Maldoc Analysis - I
M7
Identify the thief
M7
BadHost
M7
Extr4ct
M7
Pcap analysis and manipulation
M7
P2p forensics - torrent download investigation
M7
Incident response - network traffic analysis
M7
Incident response - potential malware analysis
M7
Malware pcap analysis
M7
Malware analysis
M7
Volatility - Malware-1
M7
Volatility - Malware-5
M7
Volatility - Malware-4
M7
Volatility - Malware-3
M7
Volatility - Malware-2
Viruses and Trojans
Malwares are the most prized weapons of attackers as they provide extraordinary capabilities in accessing infected systems and networks. With over a million new malware variants released every six months on the internet and a few dozen anti-virus companies to defend against them, the battle among the enterprise and the attackers is constantly increasing in complexity. A good understanding of various malwares such as viruses, Trojans, worms, rootkits, botnets etc is essential to allow a professional in handling a compromised system. While use of malwares in a penetration testing assignment is unconventional, it should not be prohibited as it is the only way to test the effectiveness of deployed anti-measures.
M7
Sussy-droper-three
M7
Sussy-droper-two
M7
Sussy-droper-one
M7
Procmon Newbie
M7
Detection-II
M7
Detection-I
M7
Parent
M7
Polyglot
M7
Entrofin
M7
Hidell
M7
Last day
M7
Maldoc Analysis - I
M7
Identify the thief
M7
BadHost
M7
Extr4ct
M7
Pcap analysis and manipulation
M7
P2p forensics - torrent download investigation
M7
Incident response - network traffic analysis
M7
Incident response - potential malware analysis
M7
Malware pcap analysis
M7
Malware analysis
M7
Volatility - Malware-1
M7
Volatility - Malware-5
M7
Volatility - Malware-4
M7
Volatility - Malware-3
M7