How to Intercept IP Connections in a Malware Analysis Lab
This short video demonstrate how you can intercept network connections in a malware analysis lab if the specimen uses IP addresses for its command-and-control or other communications. This is one of the numerous techniques covered in SANS malware analysis course FOR610: Reverse-Engineering Malware. See https://sans.org/for610 for details.
Видео How to Intercept IP Connections in a Malware Analysis Lab канала SANS Digital Forensics and Incident Response
Видео How to Intercept IP Connections in a Malware Analysis Lab канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Информация о видео
14 октября 2017 г. 0:13:59
00:05:20
Другие видео канала
![SANS Threat Analysis Rundown (STAR)](https://i.ytimg.com/vi/5ty5fle4lJY/default.jpg)
![Defending Your Business Against Ransomware & Cyber Extortion | Host: Ryan Chapman | October 10, 2023](https://i.ytimg.com/vi/7JCmN8FOZac/default.jpg)
![SANS Threat Analysis Rundown | Katie Nickels](https://i.ytimg.com/vi/wgigBNZLZ1c/default.jpg)
![Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023](https://i.ytimg.com/vi/oP81aSassNo/default.jpg)
![Handling Ransomware Incidents: What YOU Need to Know!](https://i.ytimg.com/vi/0M55onu7mVI/default.jpg)
![What is the FOR528: Ransomware for Incident Responders course all about?](https://i.ytimg.com/vi/wWZ6bo5Fjk8/default.jpg)
![Stay Ahead of Ransomware Livestream Series - Episode 2](https://i.ytimg.com/vi/UIbmwHUQxTc/default.jpg)
![Memory Forensics Acquisition Cloud](https://i.ytimg.com/vi/5Nb_iZBiUVk/default.jpg)
![FOR498 - New Course Name, New Content & A Whole Lot of Actionable Intelligence in 90 min or less](https://i.ytimg.com/vi/XCX6QnMCftM/default.jpg)
![Cloud-Powered DFIR: Harnessing the cloud to improve investigator efficiency](https://i.ytimg.com/vi/C8VnDSjPHr8/default.jpg)
![Breaking the Ransomware Tool Set: When a Threat Actor Opsec](https://i.ytimg.com/vi/uQQxduIIqAA/default.jpg)
![The Way to a Stakeholder’s Heart is by Providing Value: Measuring Success of Your CTI Program](https://i.ytimg.com/vi/5agsRg6-L4o/default.jpg)
![The Report Writer’s Grimoire](https://i.ytimg.com/vi/Lnw_VSf-znI/default.jpg)
![Lessons Learned From Over a Decade in OSINT](https://i.ytimg.com/vi/2IaNN6iOOMo/default.jpg)
![Unmasking the Iranian APT COBALT MIRAGE](https://i.ytimg.com/vi/ELa_FrHlMd8/default.jpg)
![DocIntel: A Context-Centric Cyber Threat Intelligence Platform](https://i.ytimg.com/vi/TO8cOzNm418/default.jpg)
![How to Use CTI, No Matter the Size of Your Organization](https://i.ytimg.com/vi/LzGx4HZdhNc/default.jpg)
![Operationalizing Intelligence SOPs withThink Steps](https://i.ytimg.com/vi/wTIIQCBKfno/default.jpg)
![Brighten Up the Ideal Sky: An Inside View of Charming Kitten’s Operations and Support to the IRGC](https://i.ytimg.com/vi/7LFtSFIZw7k/default.jpg)
![A Practical Case of Threat Intelligence – From IoC to Unraveling an Attacker Infrastructure](https://i.ytimg.com/vi/VJ7vnV6kWHA/default.jpg)
![The Cyber Vory: The Evolution of the Russian Organized Crime Threat Actors](https://i.ytimg.com/vi/NaLv7WAWOps/default.jpg)