Don't wanna be here? Send us removal request.
Link
Hey All, Finally my most exciting video is ready for you all!! If you are working in doing Incident Response, you should learn how to automate your run-book like I do and utilize your time for doing more productive work like- Threat Hunt!! 💥 So, here I present you #incidentresponse with #alexaskill in #blackperl Feel free to implement this and add as much as #lambda #alexaskills you want in your playbook and see Alexa doing all the job! 🙏 Also, Don't forget to Subscribe if you haven't done it already, and share all of your feedback!! I am counting on them to develop more to create quality contents!
0 notes
Link
Welcome to the malware analysis bootcamp. We will be covering everything you need to know to get started in Malware Analysis professionally. We will show you the best tools that you need and how to use them to analyse a malware from static and dynamic angle. We will also do a practical analysis how you can quickly start your journey to malware analysis. We have prepared a separate video just to prepare for the labs and give you introduction to the tools that we will be using.
In this session, we will show you how can you use INETSim to prepare a fake DNS and other required services to fool the malware so that it gets executed in the Virtual Environment. Also, we will show you how can you set-up your VM safely for doing this kind of analysis. So we request you yo watch the full session and you can replicate all the steps at your lab and in your daily life as well.
0 notes
Video
youtube
You are being exposed to malicious scripts in one form or other every day, whether it be in email, documents, or websites. Many malicious scripts at first glance appear to be impossible to understand. However, with a few tips and some simple utility scripts, you can deobfuscate them in just a few minutes. In this series you will learn how you can break the shell of obfuscation techniques the script authors use and not spend a lot of time doing it. Malicious JavaScripts are becoming the tool of choice for attackers. Although sometimes referred to as “fileless malware”, they can leave behind forensic artifacts for examiners to find.
0 notes
Video
youtube
Do you know how to properly read and analyze an email message header? In this series we will do a detailed postmortem of an email header. We’ll learn which header fields are most commonly referenced for analysis, how to determine a message’s true origin, how to read SPF and DKIM information, and we’ll even take a quick look at DMARC. We will also learn how can you curve any attachment for further analysis from the header itself in a easy way. Whether you are a completely new to this concept or an old forensics expert, this series has something for you.
Watch the demo and hit the subscribe button if you liked the content!!
0 notes
Video
youtube
Creation of Malware Analysis and Digital Forensics Lab-
Cybercriminals are constantly innovating, developing new and more sophisticated malware that can evade detection. In many ways, it has become an arms race, with both sides attempting to outwit the other. Unfortunately, the bad guys keep getting smarter. This video covers some of the best free tools for static and dynamic analysis that a DFIR analyst must have in their arsenal be a step ahead.
#malware#dfir#incident#digital forensics industry#malware analysis#free tools#ethical hacking#free tools to use#cybersecurity
1 note
·
View note