Comparing Malicious Files

Comparing Malicious Files

via YouTube Direct link

Network Graph

38 of 38

38 of 38

Network Graph

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Comparing Malicious Files

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 AV Problem
  3. 3 Marketing Problem
  4. 4 Missing Criteria
  5. 5 Researcher's Problem
  6. 6 Incident Responder's Problem
  7. 7 Sample Identification
  8. 8 Locating Associated Samples
  9. 9 Shared Engines
  10. 10 Development Methods
  11. 11 Vendors with Usable Results
  12. 12 Boiling Down Results
  13. 13 ATT&CK & Granularity
  14. 14 SEH Variation
  15. 15 Malpedia
  16. 16 Malware Classification Systems
  17. 17 Some Hashes
  18. 18 Exif metadata
  19. 19 Code Signing Certificate
  20. 20 Abused Certificates
  21. 21 PE Metadata
  22. 22 Sections
  23. 23 Resources
  24. 24 Document Metadata
  25. 25 Filenames
  26. 26 URL Structure: Download
  27. 27 URL Structure: C2
  28. 28 Mutual Exclusion (Mutex)
  29. 29 Registry key
  30. 30 Algorithms
  31. 31 Infosec Finer Things
  32. 32 Diamond Model
  33. 33 Control Flow Graph Analysis
  34. 34 Schema: STIX
  35. 35 JSON for Linking Data: JSON-LD
  36. 36 RDF N-Quad
  37. 37 Graph Tools: Graph Databases
  38. 38 Network Graph

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.