Malware has become a huge threat to organizations across the globe. Something as simple as opening an email attachment can end up costing a company millions of dollars if the appropriate controls are not in place. Thankfully, there are a plethora of malware analysis tools to help curb these cyber threats. Basic static analysis does not require that the code is actually run. Instead, static analysis examines the file for signs of malicious intent. It can be useful to identify malicious infrastructure, libraries or packed files. However, since static analysis does not actually run the code, sophisticated malware can include malicious runtime behavior that can go undetected. Dynamic malware analysis executes suspected malicious code in a safeenvironment called a sandbox. This closed system enables security professionals to watch the malware in action without the risk of letting it infect their system. This chapter teaches us some useful tools to analyze malware on infected files.
0:00 Intros
9:36 Telnet
16:21 SSH
22:36 Login SSH with Passwords
27:38 Login SSH using id_rsa (private key)
49:00 SSH Login Demo
59:00 Hydra brute force SSH
1:23:00 Malware Types
1:32:25 Virus
1:40:00 Worms
1:45:20 Trojans
1:52:40 Ransomware
1:55:50 Rootkit
1:59:00 Adware
2:01:05 Spyware - Keylogger
#osint
#redteam
#malware
#virus
#rockyou
#malwareanalysis
#worm
#trojan
#cybersecurity
#firewall
Смотрите видео [Chapter 3] Malware Analysis онлайн без регистрации, длительностью часов минут секунд в хорошем качестве. Это видео добавил пользователь Avocado 01 Январь 1970, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 4,39 раз и оно понравилось 9 людям.