وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
2

Practical Malware Analysis & Triage

سرفصل های دوره

01-Course-Introduction
  • 01-Hey,-thanks!-(0-14-)
  • 02-Whoami-&-Course-Overview-(5-55-)
  • 03-Course-Discord-Information.html

  • 02-Safety-Always!-Building-Your-Malware-Analysis-Lab-&-Malware-Safety
  • 01-Lab-Network-Options--Local-VMs-vs.-AWS-Cloud-Lab.html
  • 02-Downloading-VirtualBox-(2-29-).html
  • 02-Downloading-VirtualBox-(2-29-)
  • 03-Downloading-Windows-10-(2-05-).html
  • 03-Downloading-Windows-10-(2-05-)
  • 04-Setting-Up-the-Windows-10-VM-(8-12-)
  • 05-Downloading-REMnux.html
  • 05-Downloading-REMnux
  • 06-Installing-REMnux-(2-05-)
  • 07-Installing-FLARE-VM-(16-45-).html
  • 07-Installing-FLARE-VM-(16-45-)
  • 08-Analysis-Network-Setup-(7-26-)
  • 09-INetSim-Setup-(13-16-)
  • 10-Host-only-Safety-&-Internal-Networks.html
  • 11-Lab-VM-Repo-Link.html
  • 12-Rapid-deployable-Cloud-Malware-Analysis-Lab-Setup.html
  • 13-Course-Lab-Repo-Link.html
  • 14-Course-Lab-Repo-Download-&-Lab-Orientation-(4-00-)
  • 15-Taking-a-Snapshot-Before-First-Detonation-(1-29-).html
  • 15-Taking-a-Snapshot-Before-First-Detonation-(1-29-)
  • 16-Detonating-Our-First-Sample-(5-57-).html
  • 16-Detonating-Our-First-Sample-(5-57-)
  • 17-Tool-Troubleshooting-(5-05-)
  • 18-Course-Tool-List-&-Resources.html
  • 19-Basic-Malware-Handling-(8-52-).html
  • 19-Basic-Malware-Handling-(8-52-)
  • 20-Safe-Malware-Sourcing-&-Additional-Resources-(6-50-).html
  • 20-Safe-Malware-Sourcing-&-Additional-Resources-(6-50-)

  • 03-Basic-Static-Analysis
  • 01-Hashing-Malware-Samples-(3-45-).html
  • 01-Hashing-Malware-Samples-(3-45-)
  • 02-Malware-Repositories--VirusTotal-(2-49-).html
  • 02-Malware-Repositories--VirusTotal-(2-49-)
  • 03-Strings-&-FLOSS--Static-String-Analysis-(8-03-).html
  • 03-Strings-&-FLOSS--Static-String-Analysis-(8-03-)
  • 04-Analyzing-the-Import-Address-Table-(7-36-).html
  • 04-Analyzing-the-Import-Address-Table-(7-36-)
  • 05-Introduction-to-the-Windows-API-(6-00-).html
  • 05-Introduction-to-the-Windows-API-(6-00-)
  • 06-MalAPI.io-(4-08-).html
  • 06-MalAPI.io-(4-08-)
  • 07-To-Pack-Or-Not-To-Pack--Packed-Malware-Analysis-(9-42-).html
  • 07-To-Pack-Or-Not-To-Pack--Packed-Malware-Analysis-(9-42-)
  • 08-Combining-Analysis-Methods--PEStudio-(6-45-).html
  • 08-Combining-Analysis-Methods--PEStudio-(6-45-)
  • 09-Identifying-Malware-Capabilities-&-Intro-to-MITRE-ATT&CK.html
  • 10-Note-Review-(1-59-)

  • 04-Basic-Dynamic-Analysis
  • 01-Basic-Dynamic-Analysis-Intro--Host-and-Network-Indicators-(3-39-)
  • 02-Initial-Detonation-&-Triage--Hunting-for-Network-Signatures-(8-44-).html
  • 02-Initial-Detonation-&-Triage--Hunting-for-Network-Signatures-(8-44-)
  • 03-Host-Based-Indicators--Procmon-Part-I-(7-44-).html
  • 03-Host-Based-Indicators--Procmon-Part-I-(7-44-)
  • 04-Host-Based-Indicators--Procmon-Part-II-(6-06-).html
  • 04-Host-Based-Indicators--Procmon-Part-II-(6-06-)
  • 05-Dynamic-Analysis-of-Unknown-Binaries-Part-I--Analyzing-Wireshark-(13-02-).html
  • 05-Dynamic-Analysis-of-Unknown-Binaries-Part-I--Analyzing-Wireshark-(13-02-)
  • 06-Dynamic-Analysis-of-Unknown-Binaries-Part-II--Host-Based-Indicators-(21-19-).html
  • 06-Dynamic-Analysis-of-Unknown-Binaries-Part-II--Host-Based-Indicators-(21-19-)
  • 07-Analyzing-a-Reverse-Shell-Part-I--Correlating-IOCs-(18-12-).html
  • 07-Analyzing-a-Reverse-Shell-Part-I--Correlating-IOCs-(18-12-)
  • 08-Analyzing-a-Reverse-Shell-Part-II--Parent-Child-Process-Analysis-(6-43-).html
  • 08-Analyzing-a-Reverse-Shell-Part-II--Parent-Child-Process-Analysis-(6-43-)

  • 05-Challenge-1--SillyPutty
  • 01-Challenge-1--SillyPutty-Intro-(1-43-).html
  • 01-Challenge-1--SillyPutty-Intro-(1-43-)
  • 02-Challenge-1--SillyPutty-Walkthrough-(18-21-)

  • 06-Advanced-Static-Analysis--Assembly-Language,-Decompiling,-&-Disassembling-Malware
  • 01-Intro-to-Advanced-Analysis-&-Assembly-Language-(10-01-)
  • 02-Disassembling-&-Decompiling-a-Malware-Dropper--Intro-to-Cutter-(8-46-).html
  • 02-Disassembling-&-Decompiling-a-Malware-Dropper--Intro-to-Cutter-(8-46-)
  • 03-x86-CPU-Instructions,-Memory-Registers,-&-the-Stack--A-Closer-Look-(13-06-)
  • 04-Revisiting-the-Dropper--Assembly-Instructions-and-the-Windows-API-(8-17-).html
  • 04-Revisiting-the-Dropper--Assembly-Instructions-and-the-Windows-API-(8-17-)
  • 05-Hello,-World!-Under-a-Microscope-Part-I-(18-31-).html
  • 05-Hello,-World!-Under-a-Microscope-Part-I-(18-31-)
  • 06-Advanced-Analysis-of-a-Process-Injector-(16-56-).html
  • 06-Advanced-Analysis-of-a-Process-Injector-(16-56-)

  • 07-Advanced-Dynamic-Analysis--Debugging-Malware
  • 01-Getting-Comfortable-in-x32dbg--Flow-Control-&-Breakpoints-(12-59-).html
  • 01-Getting-Comfortable-in-x32dbg--Flow-Control-&-Breakpoints-(12-59-)
  • 02-Debugging-the-Dropper--Dynamic-Analysis-of-x86-Instructions-&-API-Calls-(17-49-).html
  • 02-Debugging-the-Dropper--Dynamic-Analysis-of-x86-Instructions-&-API-Calls-(17-49-)
  • 03-Hello,-World!-Under-a-Microscope-Part-II-(14-27-).html
  • 03-Hello,-World!-Under-a-Microscope-Part-II-(14-27-)

  • 08-Challenge-2--SikoMode
  • 01-Challenge-2--SikoMode-Intro-(1-37-).html
  • 01-Challenge-2--SikoMode-Intro-(1-37-)
  • 02-Challenge-2--SikoMode-Walkthrough-(20-18-).html
  • 02-Challenge-2--SikoMode-Walkthrough-(20-18-)
  • 03-Bonus-Lecture--Live-Analysis-of-Challenge-2-SikoMode-Twitch-Stream-with-Taggart.html

  • 09-Binary-Patching-&-Anti-analysis
  • 01-Patch-it-out--Patching-x86-Binaries.html
  • 02-Identifying-&-Defeating-Anti-analysis-Techniques.html

  • 10-Specialty-Malware-Classes
  • 01-Specialty-Malware-Classes.html

  • 11-Gone-Phishing--Maldoc-Analysis
  • 01-Analyzing-Excel-Maldocs--OLEdump-(10-55-).html
  • 01-Analyzing-Excel-Maldocs--OLEdump-(10-55-)
  • 02-Analyzing-Word-Maldocs--Remote-Template-Macro-Injection-(7-35-).html
  • 02-Analyzing-Word-Maldocs--Remote-Template-Macro-Injection-(7-35-)

  • 12-What-The-Shell--Shellcode-Analysis
  • 01-Analyzing-Shellcode--Carving-Shellcode-&-scdbg-(14-29-).html
  • 01-Analyzing-Shellcode--Carving-Shellcode-&-scdbg-(14-29-)
  • 02-Carving-Shellcode-from-Memory-(13-00-).html
  • 02-Carving-Shellcode-from-Memory-(13-00-)
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    شناسه: 44946
    حجم: 1863 مگابایت
    مدت زمان: 438 دقیقه
    تاریخ انتشار: ۲ تیر ۱۴۰۴
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید