Viruses and Trojans
Rated 3.5/5 based on 11 customer reviews

Viruses and Trojans

Available: Out of Stock
$0.00

Request Info

Viruses and Trojans

Malwares are the most prized weapons of attackers as they provide extraordinary capabilities in accessing infected systems and networks. With over a million new malware variants released every six months on the internet and a few dozen anti-virus companies to defend against them, the battle among the enterprise and the attackers is constantly increasing in complexity. A good understanding of various malwares such as viruses, Trojans, worms, rootkits, botnets etc is essential to allow a professional in handling a compromised system. While use of malwares in a penetration testing assignment is unconventional, it should not be prohibited as it is the only way to test the effectiveness of deployed anti-measures.

 

M7

Sussy-droper-three

M7

Sussy-droper-two

M7

Sussy-droper-one

M7

Procmon Newbie

M7

Detection-II

M7

Detection-I

M7

Parent

M7

Polyglot

M7

Entrofin

M7

Hidell

M7

Last day

M7

Maldoc Analysis - I

M7

Identify the thief

M7

BadHost

M7

Extr4ct

M7

Pcap analysis and manipulation

M7

P2p forensics - torrent download investigation

M7

Incident response - network traffic analysis

M7

Incident response - potential malware analysis

M7

Malware pcap analysis

M7

Malware analysis

M7

Volatility - Malware-1

M7

Volatility - Malware-5

M7

Volatility - Malware-4

M7

Volatility - Malware-3

M7

Volatility - Malware-2

Viruses and Trojans

Malwares are the most prized weapons of attackers as they provide extraordinary capabilities in accessing infected systems and networks. With over a million new malware variants released every six months on the internet and a few dozen anti-virus companies to defend against them, the battle among the enterprise and the attackers is constantly increasing in complexity. A good understanding of various malwares such as viruses, Trojans, worms, rootkits, botnets etc is essential to allow a professional in handling a compromised system. While use of malwares in a penetration testing assignment is unconventional, it should not be prohibited as it is the only way to test the effectiveness of deployed anti-measures.

 

M7

Sussy-droper-three

M7

Sussy-droper-two

M7

Sussy-droper-one

M7

Procmon Newbie

M7

Detection-II

M7

Detection-I

M7

Parent

M7

Polyglot

M7

Entrofin

M7

Hidell

M7

Last day

M7

Maldoc Analysis - I

M7

Identify the thief

M7

BadHost

M7

Extr4ct

M7

Pcap analysis and manipulation

M7

P2p forensics - torrent download investigation

M7

Incident response - network traffic analysis

M7

Incident response - potential malware analysis

M7

Malware pcap analysis

M7

Malware analysis

M7

Volatility - Malware-1

M7

Volatility - Malware-5

M7

Volatility - Malware-4

M7

Volatility - Malware-3

M7

Volatility - Malware-2