Advanced Malware Analysis Ransomware

mp4   Hot:14   Size:182.37 MB   Created:2022-03-30 16:41:15   Update:2024-09-07 20:04:16  

Download link

File List

  • 3 - Performing_Static_Analysis_on_Compromised_Machines/16. DEMO_-_Analyzing_a_Wannacry_Infected_Machine.mp4 20.9 MB
    1 - Course_Overview/Linux Tails Operating System.html 84 B
    2 - Learning_How_Ransomware_Works/6 Simple Memory Techniques.html 98 B
    2 - Learning_How_Ransomware_Works/02. Introduction.mp4 1.6 MB
    2 - Learning_How_Ransomware_Works/03. What_You_Already_Know_About_Ransomware.mp4 3.77 MB
    2 - Learning_How_Ransomware_Works/04. Building_a_Ransomware_Analysis_Lab.mp4 7.48 MB
    2 - Learning_How_Ransomware_Works/05. Understanding_Ransomware_Building_Blocks.mp4 2.93 MB
    2 - Learning_How_Ransomware_Works/06. Understanding_the_Crypto_Behind_Ransomware.mp4 4.35 MB
    2 - Learning_How_Ransomware_Works/07. Analyzing_Open_Source_Ransomware.mp4 9.92 MB
    2 - Learning_How_Ransomware_Works/08. Module_Summary.mp4 2.01 MB
    3 - Performing_Static_Analysis_on_Compromised_Machines/09. Introduction.mp4 1.96 MB
    3 - Performing_Static_Analysis_on_Compromised_Machines/10. Acquiring_Digital_Evidence.mp4 3.54 MB
    3 - Performing_Static_Analysis_on_Compromised_Machines/11. Analyzing_Compromised_Machines.mp4 3.89 MB
    3 - Performing_Static_Analysis_on_Compromised_Machines/12. Working_with_Memory_Images.mp4 2.37 MB
    3 - Performing_Static_Analysis_on_Compromised_Machines/13. Hunting_for_Basic_Indicators.mp4 3.15 MB
    3 - Performing_Static_Analysis_on_Compromised_Machines/14. Leveraging_OSINT.mp4 4.9 MB
    3 - Performing_Static_Analysis_on_Compromised_Machines/15. Hunting_with_Yara.mp4 3.75 MB
    1 - Course_Overview/01. Course_Overview.mp4 4.38 MB
    3 - Performing_Static_Analysis_on_Compromised_Machines/17. Summary.mp4 1.28 MB
    4 - Analyzing_Early_Infection_Stages/18. Introduction.mp4 1.73 MB
    4 - Analyzing_Early_Infection_Stages/19. Learning_the_Tools.mp4 3.34 MB
    4 - Analyzing_Early_Infection_Stages/20. Ransomware_and_the_Volume_Shadow_Copy_Service.mp4 4.16 MB
    4 - Analyzing_Early_Infection_Stages/21. Analyzing_Kill_Switches.mp4 8.16 MB
    4 - Analyzing_Early_Infection_Stages/22. Stopping_Bad_Rabbit_Ransomware.mp4 9.78 MB
    4 - Analyzing_Early_Infection_Stages/23. Summary.mp4 1.24 MB
    5 - Analyzing_Propagation_and_Replication_Techniques/24. Introduction.mp4 2.6 MB
    5 - Analyzing_Propagation_and_Replication_Techniques/25. Analyzing_Propagation_through_Exploits.mp4 2.46 MB
    5 - Analyzing_Propagation_and_Replication_Techniques/26. Analyzing_Propagation_through_Removable_Media.mp4 2.97 MB
    5 - Analyzing_Propagation_and_Replication_Techniques/27. Analyzing_Propagation_through_File_Shares.mp4 1.68 MB
    5 - Analyzing_Propagation_and_Replication_Techniques/28. Analyzing_Malicious_Shortcuts.mp4 1.32 MB
    5 - Analyzing_Propagation_and_Replication_Techniques/29. Demo_-_Improving_Ransomware_Analysis_Techniques.mp4 10.87 MB
    5 - Analyzing_Propagation_and_Replication_Techniques/30. Summary.mp4 979.1 KB
    6 - Protecting_against_Ransomware/31. Introduction.mp4 2.6 MB
    6 - Protecting_against_Ransomware/32. Avoiding_Common_Pitfalls.mp4 3.7 MB
    6 - Protecting_against_Ransomware/33. Finding_Patient_0.mp4 16.09 MB
    6 - Protecting_against_Ransomware/34. Preventing_Future_Attacks.mp4 5.44 MB
    6 - Protecting_against_Ransomware/35. Putting_Your_Skills_into_Practice.mp4 3.44 MB
    6 - Protecting_against_Ransomware/36. Summary.mp4 1.17 MB
    6 - Protecting_against_Ransomware/Defense against the Black Arts.html 84 B
    advanced-malware-analysis-ransomware/inetsim.conf 40.9 KB
    advanced-malware-analysis-ransomware/malware.txt 864 B
    advanced-malware-analysis-ransomware/readmefirst.txt 663 B
    advanced-malware-analysis-ransomware/rsyslog.conf 1.48 KB
    advanced-malware-analysis-ransomware/smb.conf 9.96 KB
    advanced-malware-analysis-ransomware/USB Rubber Ducky Deluxe.html 84 B
    advanced-malware-analysis-ransomware/wannacry_ioc.txt 3.28 KB
    advanced-malware-analysis-ransomware/02/learning-how-ransomware-works-slides.pdf 3.56 MB
    advanced-malware-analysis-ransomware/03/performing-static-analysis-on-compromised-machines-slides.pdf 3.17 MB
    advanced-malware-analysis-ransomware/04/analyzing-early-infection-stages-slides.pdf 2.66 MB
    advanced-malware-analysis-ransomware/05/analyzing-propagation-and-replication-techniques-slides.pdf 2.73 MB
    advanced-malware-analysis-ransomware/06/protecting-against-ransomware-slides.pdf 4.3 MB

Download Info

  • Tips

    “Advanced Malware Analysis Ransomware” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.