Dynamic Malware Analysis

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024
  • You already built the malware analysis lab. We explained how to do dynamic malware analysis at this environment.
    Course link: app.letsdefend...
    This lesson prepared by Zaid Shah. His social media accounts:
    RUclips: / channel
    LinkedIn: / zaid-shah-05527a22b
    LetsDefend is a hands-on Blue Team training platform that enables people to gain practical experience by investigating real cyber attacks inside a simulated SOC
    letsdefend.io
    / letsdefend
    / letsdefendio
    / letsdefend
    / letsdefend

Комментарии • 23

  • @idkk403
    @idkk403 4 месяца назад +6

    You have no idea, how much you have helped me!!! Thankyouuuu

  • @chieduodo1292
    @chieduodo1292 Год назад +10

    Great walk-through. Lots of helpful tips. The reason Regshot did not catch file activity was because the checkbox option was not selected before your first shot. And for the HTTP traffic missing, that might be because Wireshark could not decrypt HTTPS traffic. I believe you would have seen something if you tried using fiddler as well. Thanks!

    • @mertkacir9981
      @mertkacir9981 Год назад +1

      you mean scan dir1 checkbox ? but in website they didn't check it either.

  • @tommypham1101
    @tommypham1101 2 месяца назад

    awesome content thank you

  • @bulba888
    @bulba888 2 месяца назад

    Working on that chapter at Letsdefend SOC analysis path

  • @user-bc6bb3pd5k
    @user-bc6bb3pd5k 4 месяца назад

    Brilliant 😇

  • @user-xn5cu3bg8r
    @user-xn5cu3bg8r 10 месяцев назад

    Very Informative Video Sir, I just wanted to know how you decide to run the malware for a particular amount of time. How you stopped malware to execute itself.

  • @mohdsuhailmalik3033
    @mohdsuhailmalik3033 5 месяцев назад

    thanks for the video

  • @puucca
    @puucca Год назад +1

    Zaid is so fucking fun bro i cant

  • @IlyasNashid
    @IlyasNashid 6 месяцев назад

    Thank you so much this made things so much more clear to me if you have your own channel id love to follow thank you again

  • @baskaranranujan7234
    @baskaranranujan7234 Год назад +1

    How can we download malware samples as shown in the clip ?

  • @Ttyumbra
    @Ttyumbra Год назад

    How do you download the tools used for the malware analysis section ?

  • @hamzafeghouli4297
    @hamzafeghouli4297 Год назад

    is there anyway to automate this whole analysis ?

    • @Pl4s_m4
      @Pl4s_m4 10 месяцев назад +1

      If you find a way, let me know too?

    • @hamzafeghouli4297
      @hamzafeghouli4297 10 месяцев назад

      @@Pl4s_m4 check for Morrigu by Phil Leg, basically he compares the behaviour of evasive malwares before and after modifying the VM using a tool he created, maybe this will help you

  • @amigazo3972
    @amigazo3972 2 месяца назад +1

    The module is to create your own malware analysis virtual machine. NO malware files to download, not copy of your notes to download. Anything available. The course itself is just a mess. Very disappointed about this module. Your explanation is very good, but without the resources seen in these videos... not a good thing.

  • @elchirete
    @elchirete 5 месяцев назад

    On 11:05 you can see the name of the file that you are looking for inside %TEMP% tmp565A.tmp

  • @yuvarajnaresh3934
    @yuvarajnaresh3934 4 месяца назад +1

    c:\users\letsdefend\appdata
    oaming\vbxfiqycyfdggl.exe -->This is the answer

  • @BDCAT_NgoQuangTung
    @BDCAT_NgoQuangTung 10 месяцев назад

    How can we download malware samples as shown in the clip ?