Demo13 - INetSim
This video will demonstrate how to use INetSim to simulate DNS responses to fool malware into performing its C2 in the absence of connectivity to its C2 infrastructure.
The malware used in this video can be found here: https://drive.google.com/uc?export=download&id=1HENjfpAlXd181q1ePKjt2j3iZ7SEL-FZ
Видео Demo13 - INetSim канала Ben Greenberg
The malware used in this video can be found here: https://drive.google.com/uc?export=download&id=1HENjfpAlXd181q1ePKjt2j3iZ7SEL-FZ
Видео Demo13 - INetSim канала Ben Greenberg
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Memory Forensics Baselines](https://i.ytimg.com/vi/1thWaC6uvI4/default.jpg)
![Malware Analysis - Chapter 02 - Labs - VM and INetSim Setup](https://i.ytimg.com/vi/BGhZ0o0s7eM/default.jpg)
![10 Cool Command Prompt Tricks You Should Know](https://i.ytimg.com/vi/TdWPEN_57mI/default.jpg)
![How to Set up A Static IP Address in Kali Linux?](https://i.ytimg.com/vi/dXBnsnMR2WI/default.jpg)
![How a DNS Server (Domain Name System) works.](https://i.ytimg.com/vi/mpQZVYPuDGU/default.jpg)
![REMnux for Malware Analysis](https://i.ytimg.com/vi/1lKPeKkWvR8/default.jpg)
![#2 How To Analyse a Malicious Word Document](https://i.ytimg.com/vi/eBo3yYn-9y4/default.jpg)
![Demo5 - Return-Into-Libc Exploit](https://i.ytimg.com/vi/NCLUm8geskU/default.jpg)
![Using Memory forensics in security investigations - Volatility](https://i.ytimg.com/vi/eluS7_eSm8M/default.jpg)
![Demo8 - Heap Spray Example](https://i.ytimg.com/vi/MqDCn0HoTSw/default.jpg)
![Demo 17 - Fileless Malware Attack Chain - VBA, WMI, and PowerShell](https://i.ytimg.com/vi/-hhgiTP_fXQ/default.jpg)
![HakTip - How to Capture Packets with Wireshark - Getting Started](https://i.ytimg.com/vi/6X5TwvGXHP0/default.jpg)
![How to Use NETSTAT & FPORT Command to detect spyware, malware & trojans by Britec](https://i.ytimg.com/vi/yp5_xymvUck/default.jpg)
![Network Troubleshooting using PING, TRACERT, IPCONFIG, NSLOOKUP COMMANDS](https://i.ytimg.com/vi/AimCNTzDlVo/default.jpg)
![Demo3 - Format String Vulnerability and Exploit](https://i.ytimg.com/vi/HyGDezTO4aM/default.jpg)
![Learn Wireshark in 10 minutes - Wireshark Tutorial for Beginners](https://i.ytimg.com/vi/lb1Dw0elw0Q/default.jpg)
![change your IP address and MAC address in kali linux | 2021](https://i.ytimg.com/vi/HPSiI1uVGDI/default.jpg)
![Malware Analysis - Chapter 03 - Basic Dynamic Analysis](https://i.ytimg.com/vi/OzuSFQ48y9Q/default.jpg)
![[How To] Install the Sleuthkit in Windows](https://i.ytimg.com/vi/1fIhQR5Rvdk/default.jpg)
![DNS Sinkhole and Wazuh - Automatically Route Traffic Away FROM Malicious Domains](https://i.ytimg.com/vi/VP2c84I6cj4/default.jpg)