Completed
Malware: Droppers vs. Payloads
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Fileless Malware - The New Cyber Threat
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Why This Talk?
- 3 Fileless Malware - A Brief History
- 4 Types of "Fileless" Malware
- 5 Stages of A Malware Infection
- 6 Malware: Droppers vs. Payloads
- 7 Delivery Stage
- 8 Execution Stage
- 9 Interesting Execution Mechanisms
- 10 Persistence Stage
- 11 Common Persistence Mechanisms
- 12 Interesting Persistence Mechanisms
- 13 EXAMPLE TRICKBOT CAMPAIGN
- 14 PASSWORD PROTECTED WORD DOC
- 15 PAYLOAD - TRICKBOT
- 16 Poweliks - Delivery
- 17 Poweliks - Persistence
- 18 Normal DNS Forwarding
- 19 Stage 2 - Persistence for Stage 3?
- 20 Stage 2 - Powershell
- 21 Stage 4 - Command Retrieval
- 22 Command & Control
- 23 Stage 4 - Command Output
- 24 Fileless Malware - Defense