Malware Analysis
5 Threads
CyberSecurity Study Guide Estimated Duration: 8-12 Months 1/9
Tips to stay safe while working with malware samples. 1. Use different OS on the host machine than your analysis VM --> most malware will not be able to run there
Open Source SOC Tools Incident Management Systems β’ TheHive β’ FIR Network Security Monitoring β’ IDS, network metadata β Suricata: IDS, network metadata, and PCAP capable β EVEbo...
Reverse Engineering a #CobaltStrike #malware sample and extracting C2's using three different methods. We'll touch on #cyberchef, #x64dbg and Speakeasy from fireeye to perform ma...
The #ContiLeaks contained some messages consisting of IP:Username:pass combinations for #Conti infrastructure. This allows us to connect certain #Trickbot activcity with the #Cont...