Advanced Malware Analysis Ransomware
File List
- 3 - Performing_Static_Analysis_on_Compromised_Machines/16. DEMO_-_Analyzing_a_Wannacry_Infected_Machine.mp4 20.9 MB
- 6 - Protecting_against_Ransomware/33. Finding_Patient_0.mp4 16.1 MB
- 5 - Analyzing_Propagation_and_Replication_Techniques/29. Demo_-_Improving_Ransomware_Analysis_Techniques.mp4 10.9 MB
- 2 - Learning_How_Ransomware_Works/07. Analyzing_Open_Source_Ransomware.mp4 9.9 MB
- 4 - Analyzing_Early_Infection_Stages/22. Stopping_Bad_Rabbit_Ransomware.mp4 9.8 MB
- 4 - Analyzing_Early_Infection_Stages/21. Analyzing_Kill_Switches.mp4 8.2 MB
- 2 - Learning_How_Ransomware_Works/04. Building_a_Ransomware_Analysis_Lab.mp4 7.5 MB
- 6 - Protecting_against_Ransomware/34. Preventing_Future_Attacks.mp4 5.4 MB
- 3 - Performing_Static_Analysis_on_Compromised_Machines/14. Leveraging_OSINT.mp4 4.9 MB
- 1 - Course_Overview/01. Course_Overview.mp4 4.4 MB
- 2 - Learning_How_Ransomware_Works/06. Understanding_the_Crypto_Behind_Ransomware.mp4 4.4 MB
- advanced-malware-analysis-ransomware/06/protecting-against-ransomware-slides.pdf 4.3 MB
- 4 - Analyzing_Early_Infection_Stages/20. Ransomware_and_the_Volume_Shadow_Copy_Service.mp4 4.2 MB
- 3 - Performing_Static_Analysis_on_Compromised_Machines/11. Analyzing_Compromised_Machines.mp4 3.9 MB
- 2 - Learning_How_Ransomware_Works/03. What_You_Already_Know_About_Ransomware.mp4 3.8 MB
- 3 - Performing_Static_Analysis_on_Compromised_Machines/15. Hunting_with_Yara.mp4 3.7 MB
- 6 - Protecting_against_Ransomware/32. Avoiding_Common_Pitfalls.mp4 3.7 MB
- advanced-malware-analysis-ransomware/02/learning-how-ransomware-works-slides.pdf 3.6 MB
- 3 - Performing_Static_Analysis_on_Compromised_Machines/10. Acquiring_Digital_Evidence.mp4 3.5 MB
- 6 - Protecting_against_Ransomware/35. Putting_Your_Skills_into_Practice.mp4 3.4 MB
- 4 - Analyzing_Early_Infection_Stages/19. Learning_the_Tools.mp4 3.3 MB
- advanced-malware-analysis-ransomware/03/performing-static-analysis-on-compromised-machines-slides.pdf 3.2 MB
- 3 - Performing_Static_Analysis_on_Compromised_Machines/13. Hunting_for_Basic_Indicators.mp4 3.2 MB
- 5 - Analyzing_Propagation_and_Replication_Techniques/26. Analyzing_Propagation_through_Removable_Media.mp4 3.0 MB
- 2 - Learning_How_Ransomware_Works/05. Understanding_Ransomware_Building_Blocks.mp4 2.9 MB
- advanced-malware-analysis-ransomware/05/analyzing-propagation-and-replication-techniques-slides.pdf 2.7 MB
- advanced-malware-analysis-ransomware/04/analyzing-early-infection-stages-slides.pdf 2.7 MB
- 5 - Analyzing_Propagation_and_Replication_Techniques/24. Introduction.mp4 2.6 MB
- 6 - Protecting_against_Ransomware/31. Introduction.mp4 2.6 MB
- 5 - Analyzing_Propagation_and_Replication_Techniques/25. Analyzing_Propagation_through_Exploits.mp4 2.5 MB
- 3 - Performing_Static_Analysis_on_Compromised_Machines/12. Working_with_Memory_Images.mp4 2.4 MB
- 2 - Learning_How_Ransomware_Works/08. Module_Summary.mp4 2.0 MB
- 3 - Performing_Static_Analysis_on_Compromised_Machines/09. Introduction.mp4 2.0 MB
- 4 - Analyzing_Early_Infection_Stages/18. Introduction.mp4 1.7 MB
- 5 - Analyzing_Propagation_and_Replication_Techniques/27. Analyzing_Propagation_through_File_Shares.mp4 1.7 MB
- 2 - Learning_How_Ransomware_Works/02. Introduction.mp4 1.6 MB
- 5 - Analyzing_Propagation_and_Replication_Techniques/28. Analyzing_Malicious_Shortcuts.mp4 1.3 MB
- 3 - Performing_Static_Analysis_on_Compromised_Machines/17. Summary.mp4 1.3 MB
- 4 - Analyzing_Early_Infection_Stages/23. Summary.mp4 1.2 MB
- 6 - Protecting_against_Ransomware/36. Summary.mp4 1.2 MB
- 5 - Analyzing_Propagation_and_Replication_Techniques/30. Summary.mp4 979.1 KB
- advanced-malware-analysis-ransomware/inetsim.conf 40.9 KB
- advanced-malware-analysis-ransomware/smb.conf 10.0 KB
- advanced-malware-analysis-ransomware/wannacry_ioc.txt 3.3 KB
- advanced-malware-analysis-ransomware/rsyslog.conf 1.5 KB
- advanced-malware-analysis-ransomware/malware.txt 864 bytes
- advanced-malware-analysis-ransomware/readmefirst.txt 663 bytes
- 2 - Learning_How_Ransomware_Works/6 Simple Memory Techniques.html 98 bytes
- 1 - Course_Overview/Linux Tails Operating System.html 84 bytes
- 6 - Protecting_against_Ransomware/Defense against the Black Arts.html 84 bytes
- advanced-malware-analysis-ransomware/USB Rubber Ducky Deluxe.html 84 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.