LOGiN PANeL

«    April 2025    »
MoTuWeThFrSaSu
 123456
78910111213
14151617181920
21222324252627
282930 
PoLL





eBooks Tutorials Templates Plugins Scripts Applications GFX Collections SCRiPTMAFiA.ORG
Support SCRiPTMAFiA.ORG
Support SCRiPTMAFiA.ORG
LaST oN NULLeD.org
Microsoft Office Professional Plus 2021-2024 VL v2503 Build 18623.20208 (x86/x64) Multilingual Microsoft Office Professional Plus 2021-2024 VL v2503 Build 18623.20208 (x86/x64) Multilingual Languages: ...
Windows 11 Pro 24H2 26100.2894 Fullsoft 2025 Windows 11 Pro 24H2 26100.2894 Fullsoft 2025 Windows x64 | Languages: English | File Size: 5.20 GB
Acon Digital Restoration Suite 2.1.27 Acon Digital Restoration Suite 2.1.27 File size: 12.9 MB
Self Love Digital Self Love Digital | 109 MB Repeatedly judging yourself, ‘shoulding’ on yourself, or blaming yourself leads to anxiety, ...
Sean Anthony – PDF Profits Protocol Sean Anthony – PDF Profits Protocol | 11.1 GB Here’s What You Get: The PDF Profits Protocol, designed by Sean ...
The Unofficial Science Of Die Hard (2024) 1080p WEBRip 5 1 YIFY The Unofficial Science Of Die Hard 2024 1080p WEBRip x264 AAC5 1-YIFY Comedy actors Chris Ramsey and Paul Chowdhry ...

RSS
RSS

FRiENDS
Nulled.org Software 8TM URL Shortener RoboForex Forex market




Malware Analysis Of Malicious Documents

Category: Tutorials



Malware Analysis Of Malicious Documents
Malware Analysis Of Malicious Documents
Last updated 5/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English (US) | Size: 1.10 GB | Duration: 4h 28m


A Beginner's Course on Analyzing Malicious PDF and Microsoft Office Documents Using Remnux and Windows Virtual Machines

What you'll learn
Analyzing Malicious Documents
Analyzing Malicious PDF documents
Analyzing Malicious Microsoft documents
Install Remnux Virtual Machine
Extracting document Meta-Data
Basic Linux Commands Used in Malware Analysis
Extracting Embedded Objects and jаvascript from PDF documents
Extracting VBA Macro Scripts from Office Documents
De-obfuscating jаvascript and VBA scripts
Automating Analysis of Documents
Viewing and Debugging Malicious Office Macros
Identifying Maker and Origin of Malicious Documents
Using Yara to Identify Malicious Patterns and Signatures
Analyzing Open Office XML Format Documents
Analyzing Structured Storage Format Documents
Estimating age and date of document creation
Analyzing powershell scripts
Detecting Malware Artifacts and Indicators of Compromise
and more.

Requirements
Windows PC
Interest in Malware Analysis
Basic Linux knowledge helpful but not strictly necessary

Description
Did you know that you could infect your computer just by opening a pdf or microsoft office document? If that came as a shocker for you then you need to take this course. Documents are one of the main vector of attacks for malware authors because of their widespread use. Everyone uses documents to create reports, memos and articles. In fact everything we do for communication involves the use of documents. That is why this is a very popular way to infect computers. Documents are used as the first stage of a malware attack. Embedded in documents are scripts that will download a second stage payload consisting of additional malware, eg ransomware, remote access tools and more. In this course, you will learn how to check and analyze malicious pdf and office documents for signs of malicious artifacts and indicators of compromise. This is a beginners course and targeted to those who are absolutely new to this field. I will take you from zero to proficient level in analyzing malicious documents. You will learn using plenty of practical walk-throughs. We will learn the basic knowledge and skills in analyzing documents. All the needed tools and where to download them will be provided. By the end of this course, you will have the fundamentals of malware analysis of documents under your belt to further your studies in this field. Even if you do not intend to take up malware analysis as a career, still the knowledge and skills gained would enable you to check documents for dangers and protect yourself from these attacks.We will use remnux and windows virtual machine. Remnux is a Debian-based linux distribution that contains all the necessary tools for malware analysis. Some background on linux would be helpful but not strictly necessary. We will also install document debuggers in a windows virtual machine. Then, I will show you how to get started with the very basic tools in remnux and windows. All the essential theory will be covered but kept to the minimum. The emphasis is on practicals and lab exercises.Go ahead and enroll now and I will see you inside.

Who this course is for:
Beginners to Malware Analysis,Students embarking on career path to become Malware Analysts,Anyone eager to learn how to know if a document is malicious

For More Courses Visit & Bookmark Your Preferred Language Blog
From Here: - - - - - - - -








   
   
   




We need your support!
Make a donation to help us stay online
        
Bitcoin (BTC)
bc1q08g9d22cxkawsjlf8etuek2pc9n2a3hs4cdrld
	
Bitcoin Cash (BCH)
qqvwexzhvgauxq2apgc4j0ewvcak6hh6lsnzmvtkem

Ethereum (ETH)
0xb55513D2c91A6e3c497621644ec99e206CDaf239

Litecoin (LTC)
ltc1qt6g2trfv9tjs4qj68sqc4uf0ukvc9jpnsyt59u

USDT (ERC20)
0xb55513D2c91A6e3c497621644ec99e206CDaf239

USDT (TRC20)
TYdPNrz7v1P9riWBWZ317oBgJueheGjATm




Related news:

 

Information

 
  Users of GUESTS are not allowed to comment this publication.