Exploring the Target Exfiltration Malware with Sandbox Tools

Exploring the Target Exfiltration Malware with Sandbox Tools

via YouTube Direct link

TECHNOLOGY ISN'T THE ONLY WAY

32 of 33

32 of 33

TECHNOLOGY ISN'T THE ONLY WAY

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exploring the Target Exfiltration Malware with Sandbox Tools

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 WHAT ARE WE DOING?
  3. 3 FULL DISCLOSURE
  4. 4 OVERVIEW
  5. 5 MALWARE - POS
  6. 6 MALWARE - DROP SPOT
  7. 7 MALWARE - FINAL EXFILTRATION
  8. 8 THREAT SCORE?
  9. 9 STATIC & DYNAMIC
  10. 10 STATIC ANALYSIS
  11. 11 STATIC - SECTIONS
  12. 12 STRING ANALYSIS
  13. 13 DYNAMIC ANALYSIS
  14. 14 PROCESS MANAGEMENT
  15. 15 PROCESS CREATED
  16. 16 FTP PACKETS
  17. 17 IP SCANNER
  18. 18 WHAT DID WE LEARN?
  19. 19 EASY TO USE
  20. 20 DETECTION OBSESSION
  21. 21 VM EVASION
  22. 22 TO CONSIDER
  23. 23 RIGHT TOOLS FOR THE JOB?
  24. 24 ECON 101
  25. 25 WHEN TO USE A TOOL?
  26. 26 WHEN NOT TO USE A TOOL?
  27. 27 CAN SECURITY BE AUTOMATED?
  28. 28 SO SHOULD I BUY A SANDBOX OR WHAT BUDDY?
  29. 29 ARMS RACE
  30. 30 EVOLVE OR DIE
  31. 31 TRAINING
  32. 32 TECHNOLOGY ISN'T THE ONLY WAY
  33. 33 WHAT'S RIGHT FOR YOUR ORGANIZATION?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.