Completed
CAN SECURITY BE AUTOMATED?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Exploring the Target Exfiltration Malware with Sandbox Tools
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 WHAT ARE WE DOING?
- 3 FULL DISCLOSURE
- 4 OVERVIEW
- 5 MALWARE - POS
- 6 MALWARE - DROP SPOT
- 7 MALWARE - FINAL EXFILTRATION
- 8 THREAT SCORE?
- 9 STATIC & DYNAMIC
- 10 STATIC ANALYSIS
- 11 STATIC - SECTIONS
- 12 STRING ANALYSIS
- 13 DYNAMIC ANALYSIS
- 14 PROCESS MANAGEMENT
- 15 PROCESS CREATED
- 16 FTP PACKETS
- 17 IP SCANNER
- 18 WHAT DID WE LEARN?
- 19 EASY TO USE
- 20 DETECTION OBSESSION
- 21 VM EVASION
- 22 TO CONSIDER
- 23 RIGHT TOOLS FOR THE JOB?
- 24 ECON 101
- 25 WHEN TO USE A TOOL?
- 26 WHEN NOT TO USE A TOOL?
- 27 CAN SECURITY BE AUTOMATED?
- 28 SO SHOULD I BUY A SANDBOX OR WHAT BUDDY?
- 29 ARMS RACE
- 30 EVOLVE OR DIE
- 31 TRAINING
- 32 TECHNOLOGY ISN'T THE ONLY WAY
- 33 WHAT'S RIGHT FOR YOUR ORGANIZATION?