Advanced Malware Analysis: Ransomware
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size182.4 MB
- Uploaded BySource1337
- Downloads225
- Last checkedMay. 19th '21
- Date uploadedMay. 16th '21
- Seeders 14
- Leechers6
Quote:
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without “Them”, you and we won’t be here having this conversation. Think about it! ☮️ Peace.✌️
Code:
Description
Ransomware attacks have continued to grow in frequency and potency, causing large business impact. There is no reason for you and your company to become a victim of this destructive piece of Malware. In this course, Advanced Malware Analysis: Ransomware, you will gain the ability to determine if compromised machines were infected with Ransomware. First, you will learn some of the early indicators of when Ransomware infects a system. Next, you will discover how kill switches can help you prevent attacks. Finally, you will explore how Ransomware spreads throughout the network and how it manages to infect a large number of computers. When you are finished with this course, you will have the skills and knowledge of Ransomware Analysis, enabling you to identify, contain, and eradicate attacks much more effectively.
Ransomware attacks have continued to grow in frequency and potency, causing large business impact. There is no reason for you and your company to become a victim of this destructive piece of Malware. In this course, Advanced Malware Analysis: Ransomware, you will gain the ability to determine if compromised machines were infected with Ransomware. First, you will learn some of the early indicators of when Ransomware infects a system. Next, you will discover how kill switches can help you prevent attacks. Finally, you will explore how Ransomware spreads throughout the network and how it manages to infect a large number of computers. When you are finished with this course, you will have the skills and knowledge of Ransomware Analysis, enabling you to identify, contain, and eradicate attacks much more effectively.
Files:
Advanced Malware Analysis Ransomware 3 - Performing_Static_Analysis_on_Compromised_Machines- 16. DEMO_-_Analyzing_a_Wannacry_Infected_Machine.mp4 (20.9 MB)
- 09. Introduction.mp4 (2.0 MB)
- 10. Acquiring_Digital_Evidence.mp4 (3.5 MB)
- 11. Analyzing_Compromised_Machines.mp4 (3.9 MB)
- 12. Working_with_Memory_Images.mp4 (2.4 MB)
- 13. Hunting_for_Basic_Indicators.mp4 (3.2 MB)
- 14. Leveraging_OSINT.mp4 (4.9 MB)
- 15. Hunting_with_Yara.mp4 (3.7 MB)
- 17. Summary.mp4 (1.3 MB)
- Linux Tails Operating System.html (0.1 KB)
- 01. Course_Overview.mp4 (4.4 MB)
- 6 Simple Memory Techniques.html (0.1 KB)
- 02. Introduction.mp4 (1.6 MB)
- 03. What_You_Already_Know_About_Ransomware.mp4 (3.8 MB)
- 04. Building_a_Ransomware_Analysis_Lab.mp4 (7.5 MB)
- 05. Understanding_Ransomware_Building_Blocks.mp4 (2.9 MB)
- 06. Understanding_the_Crypto_Behind_Ransomware.mp4 (4.4 MB)
- 07. Analyzing_Open_Source_Ransomware.mp4 (9.9 MB)
- 08. Module_Summary.mp4 (2.0 MB)
- 18. Introduction.mp4 (1.7 MB)
- 19. Learning_the_Tools.mp4 (3.3 MB)
- 20. Ransomware_and_the_Volume_Shadow_Copy_Service.mp4 (4.2 MB)
- 21. Analyzing_Kill_Switches.mp4 (8.2 MB)
- 22. Stopping_Bad_Rabbit_Ransomware.mp4 (9.8 MB)
- 23. Summary.mp4 (1.2 MB)
- 24. Introduction.mp4 (2.6 MB)
- 25. Analyzing_Propagation_through_Exploits.mp4 (2.5 MB)
- 26. Analyzing_Propagation_through_Removable_Media.mp4 (3.0 MB)
- 27. Analyzing_Propagation_through_File_Shares.mp4 (1.7 MB)
- 28. Analyzing_Malicious_Shortcuts.mp4 (1.3 MB)
- 29. Demo_-_Improving_Ransomware_Analysis_Techniques.mp4 (10.9 MB)
- 30. Summary.mp4 (979.1 KB)
- 31. Introduction.mp4 (2.6 MB)
- 32. Avoiding_Common_Pitfalls.mp4 (3.7 MB)
- 33. Finding_Patient_0.mp4 (16.1 MB)
- 34. Preventing_Future_Attacks.mp4 (5.4 MB)
- 35. Putting_Your_Skills_into_Practice.mp4 (3.4 MB)
- 36. Summary.mp4 (1.2 MB)
- Defense against the Black Arts.html (0.1 KB)
- inetsim.conf (40.9 KB)
- malware.txt (0.8 KB)
- readmefirst.txt (0.6 KB)
- rsyslog.conf (1.5 KB)
- smb.conf (10.0 KB)
- USB Rubber Ducky Deluxe.html (0.1 KB)
- wannacry_ioc.txt (3.3 KB) 02
- learning-how-ransomware-works-slides.pdf (3.6 MB)
- performing-static-analysis-on-compromised-machines-slides.pdf (3.2 MB)
- analyzing-early-infection-stages-slides.pdf (2.7 MB)
- analyzing-propagation-and-replication-techniques-slides.pdf (2.7 MB)
- protecting-against-ransomware-slides.pdf (4.3 MB)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.moeking.me:6969/announce
- http://tracker-cdn.moeking.me:2095/announce
- udp://wassermann.online:6969/announce
- udp://vibe.community:6969/announce
- udp://valakas.rollo.dnsabr.com:2710/announce
- udp://udp-tracker.shittyurl.org:6969/announce
- udp://tracker1.bt.moack.co.kr:80/announce
- udp://tracker0.ufibox.com:6969/announce
- udp://tracker.zerobytes.xyz:1337/announce
- udp://tracker.zemoj.com:6969/announce
- udp://tracker.v6speed.org:6969/announce
- udp://tracker.uw0.xyz:6969/announce