Fileless Malware - The New Cyber Threat

Fileless Malware - The New Cyber Threat

via YouTube Direct link

Common Persistence Mechanisms

11 of 24

11 of 24

Common Persistence Mechanisms

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Fileless Malware - The New Cyber Threat

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why This Talk?
  3. 3 Fileless Malware - A Brief History
  4. 4 Types of "Fileless" Malware
  5. 5 Stages of A Malware Infection
  6. 6 Malware: Droppers vs. Payloads
  7. 7 Delivery Stage
  8. 8 Execution Stage
  9. 9 Interesting Execution Mechanisms
  10. 10 Persistence Stage
  11. 11 Common Persistence Mechanisms
  12. 12 Interesting Persistence Mechanisms
  13. 13 EXAMPLE TRICKBOT CAMPAIGN
  14. 14 PASSWORD PROTECTED WORD DOC
  15. 15 PAYLOAD - TRICKBOT
  16. 16 Poweliks - Delivery
  17. 17 Poweliks - Persistence
  18. 18 Normal DNS Forwarding
  19. 19 Stage 2 - Persistence for Stage 3?
  20. 20 Stage 2 - Powershell
  21. 21 Stage 4 - Command Retrieval
  22. 22 Command & Control
  23. 23 Stage 4 - Command Output
  24. 24 Fileless Malware - Defense

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.