How to Hunt for Malware - Techniques and Tools for Malware Analysis

How to Hunt for Malware - Techniques and Tools for Malware Analysis

NahamSec via YouTube Direct link

Introduction

1 of 17

1 of 17

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

How to Hunt for Malware - Techniques and Tools for Malware Analysis

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Learning the basics of malware analysis and hunting.
  3. 3 Malware can be delivered through various methods.
  4. 4 Exploring the dark web for potential malware sources.
  5. 5 Exploring different types of malware on the dark web
  6. 6 Tracking malware creators through signatures
  7. 7 Exploring malware samples using virtual machines and different operating systems.
  8. 8 Identifying and tracking malware through indicators of compromise
  9. 9 Identifying and reporting vulnerable system to Steam
  10. 10 Analysis of malware distribution source
  11. 11 Identifying infected files communicating with specific domains
  12. 12 Accessing and analyzing malware samples using online resources
  13. 13 Use tools like WireShark and Joe Sandbox for malware analysis.
  14. 14 Examining malware's activities and potential impact
  15. 15 Investigating if a program is potentially a cleaner or malware.
  16. 16 Analyzing network traffic and identifying potential security threats.
  17. 17 Understanding the safe sandbox for malware hunting

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.