Completed
Network configuration
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hunting Linux Malware for Fun and Flags
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 About this presentation
- 3 Why malware on Linux servers?
- 4 Why care?
- 5 Why understand them?
- 6 Artifacts
- 7 Common file metadata
- 8 Basic filesystem
- 9 Package integrity
- 10 Logs
- 11 Using auditd
- 12 Offline filesystem
- 13 Analyzing a live process
- 14 procfs exe magic link
- 15 Process stalling
- 16 Process memory dump
- 17 Kernel memory
- 18 Network configuration
- 19 Network capture
- 20 Two approaches
- 21 Reversing script-based malware
- 22 Reverse engineering compiled malware
- 23 This week you should
- 24 Within three months you should
- 25 Next you should