Performing Malware Analysis on Malicious Documents
Category: Tutorials
- views: 63
- date: 24 September 2024
- posted by: oaxino
Performing Malware Analysis on Malicious Documents

Tyler Hudak | Duration: 2:59 h | Video: H264 1280x720 | Audio: AAC 44,1 kHz 2ch | 456 MB | Language: English
Malicious documents have become a form of malware that all incident responders need to be able to analyze. This course will teach you how to analyze malicious Adobe PDF and Microsoft Office documents, along with any malicious scripts they contain.
Hiding malware within documents has become one the main methods attackers use to compromise systems. In this course, Performing Malware Analysis on Malicious Documents, you will learn how to look at documents to determine if they contain malware, and if so, what that malware does. First, you will explore how to analyze malicious Adobe PDF and Microsoft Office documents. Next, you will discover how attackers obfuscate scripts within malicious documents, and how you can defeat that obfuscation to determine the script's purpose. Finally, you will dive into the tools required to perform this analysis safely and quickly. When you're finished with this course, you will have the skills and knowledge needed to perform malware analysis on malicious documents.
Homepage:
https://www.pluralsight.com/courses/malware-analysis-malicious-documents-performing
Screenshots

Download link
rapidgator.net:
ddownload.com:
We need your support!
Make a donation to help us stay online
Bitcoin (BTC)
bc1q08g9d22cxkawsjlf8etuek2pc9n2a3hs4cdrld
Bitcoin Cash (BCH)
qqvwexzhvgauxq2apgc4j0ewvcak6hh6lsnzmvtkem
Ethereum (ETH)
0xb55513D2c91A6e3c497621644ec99e206CDaf239
Litecoin (LTC)
ltc1qt6g2trfv9tjs4qj68sqc4uf0ukvc9jpnsyt59u
USDT (ERC20)
0xb55513D2c91A6e3c497621644ec99e206CDaf239
USDT (TRC20)
TYdPNrz7v1P9riWBWZ317oBgJueheGjATm
Related news:
Information |
|||
![]() |
Users of GUESTS are not allowed to comment this publication. |