Archived
files |
advanced-malware-analysis-ransomware.zip |
14,615,029 |
598CA395 |
Advanced Malware Analysis - Ransomware\5.Analyzing Propagation and Replication Techniques\25.Analyzing Propagation through Exploits.mp4
[c3633739b6cf68e4]
|
2,582,492 |
A938EDBF |
Advanced Malware Analysis - Ransomware\5.Analyzing Propagation and Replication Techniques\26.Analyzing Propagation through Removable Media.mp4
[2b94e8945c6f00ac]
|
3,110,435 |
095B4EC8 |
Advanced Malware Analysis - Ransomware\5.Analyzing Propagation and Replication Techniques\24.Introduction.mp4
[a4a6c61341bf558c]
|
2,728,592 |
995F954B |
Advanced Malware Analysis - Ransomware\5.Analyzing Propagation and Replication Techniques\29.Demo - Improving Ransomware Analysis Techniques.mp4
[2dcf85ed4f5ebd8a]
|
11,401,009 |
E0E0B54F |
Advanced Malware Analysis - Ransomware\5.Analyzing Propagation and Replication Techniques\30.Summary.mp4
[8d28f9ca1798d86d]
|
1,002,603 |
34CE3B6D |
Advanced Malware Analysis - Ransomware\5.Analyzing Propagation and Replication Techniques\27.Analyzing Propagation through File Shares.mp4
[96fd928d5c2dd981]
|
1,764,893 |
BEA595F3 |
Advanced Malware Analysis - Ransomware\5.Analyzing Propagation and Replication Techniques\28.Analyzing Malicious Shortcuts.mp4
[9bab8385dc2165b]
|
1,379,964 |
108CD28F |
Advanced Malware Analysis - Ransomware\2.Learning How Ransomware Works\05.Understanding Ransomware Building Blocks.mp4
[77ffbef0c1584066]
|
3,071,598 |
8556A25A |
Advanced Malware Analysis - Ransomware\2.Learning How Ransomware Works\06.Understanding the Crypto Behind Ransomware.mp4
[d329b58e3d49107e]
|
4,565,672 |
0155BCB7 |
Advanced Malware Analysis - Ransomware\2.Learning How Ransomware Works\07.Analyzing Open Source Ransomware.mp4
[dc9a638b24ef68d2]
|
10,406,183 |
6E2E7F91 |
Advanced Malware Analysis - Ransomware\2.Learning How Ransomware Works\04.Building a Ransomware Analysis Lab.mp4
[d629f497139fa4f6]
|
7,847,021 |
5FA1BBB2 |
Advanced Malware Analysis - Ransomware\2.Learning How Ransomware Works\02.Introduction.mp4
[1d51602cd2fb7ba1]
|
1,673,490 |
4C9A1CB9 |
Advanced Malware Analysis - Ransomware\2.Learning How Ransomware Works\08.Module Summary.mp4
[69e98a4940b424c3]
|
2,103,090 |
C36E3862 |
Advanced Malware Analysis - Ransomware\2.Learning How Ransomware Works\03.What You Already Know About Ransomware.mp4
[8e28fe114cd43cc9]
|
3,951,805 |
49FD62F1 |
Advanced Malware Analysis - Ransomware\3.Performing Static Analysis on Compromised Machines\14.Leveraging OSINT.mp4
[e5acdf597626251c]
|
5,141,567 |
FCFC7892 |
Advanced Malware Analysis - Ransomware\3.Performing Static Analysis on Compromised Machines\10.Acquiring Digital Evidence.mp4
[ef439d780bea9e4]
|
3,716,213 |
88546991 |
Advanced Malware Analysis - Ransomware\3.Performing Static Analysis on Compromised Machines\11.Analyzing Compromised Machines.mp4
[1a2e2f02b4ef188c]
|
4,083,294 |
B759783C |
Advanced Malware Analysis - Ransomware\3.Performing Static Analysis on Compromised Machines\16.DEMO - Analyzing a Wannacry Infected Machine.mp4
[52222b60af43fb8]
|
21,912,897 |
2D241DE8 |
Advanced Malware Analysis - Ransomware\3.Performing Static Analysis on Compromised Machines\15.Hunting with Yara.mp4
[7e37a2de5d168c7f]
|
3,929,450 |
31EE75F6 |
Advanced Malware Analysis - Ransomware\3.Performing Static Analysis on Compromised Machines\09.Introduction.mp4
[fb12e65be55db022]
|
2,054,605 |
6F5433FE |
Advanced Malware Analysis - Ransomware\3.Performing Static Analysis on Compromised Machines\12.Working with Memory Images.mp4
[e72eb4245d32b7f5]
|
2,489,821 |
C542F8D1 |
Advanced Malware Analysis - Ransomware\3.Performing Static Analysis on Compromised Machines\17.Summary.mp4
[27701a2da18dd77e]
|
1,338,855 |
B92AFCB1 |
Advanced Malware Analysis - Ransomware\3.Performing Static Analysis on Compromised Machines\13.Hunting for Basic Indicators.mp4
[b7bd7fc678a9c500]
|
3,303,245 |
5E645E7E |
Advanced Malware Analysis - Ransomware\1.Course Overview\01.Course Overview.mp4
[7626c8eecdaa5c7f]
|
4,594,662 |
B29962AE |
Advanced Malware Analysis - Ransomware\4.Analyzing Early Infection Stages\22.Stopping Bad Rabbit Ransomware.mp4
[659a0cc1af6605fc]
|
10,255,342 |
830C5695 |
Advanced Malware Analysis - Ransomware\4.Analyzing Early Infection Stages\19.Learning the Tools.mp4
[994349dca8c45316]
|
3,499,123 |
9365EA4B |
Advanced Malware Analysis - Ransomware\4.Analyzing Early Infection Stages\23.Summary.mp4
[f7e68af683199742]
|
1,303,768 |
C1477E54 |
Advanced Malware Analysis - Ransomware\4.Analyzing Early Infection Stages\20.Ransomware and the Volume Shadow Copy Service.mp4
[8315c535a27742f0]
|
4,363,605 |
D10E821D |
Advanced Malware Analysis - Ransomware\4.Analyzing Early Infection Stages\21.Analyzing Kill Switches.mp4
[505cf4fcbbfb9c1e]
|
8,559,481 |
31C8B2DC |
Advanced Malware Analysis - Ransomware\4.Analyzing Early Infection Stages\18.Introduction.mp4
[c75f8430926b1c16]
|
1,818,886 |
E6B59ADE |
Advanced Malware Analysis - Ransomware\6.Protecting against Ransomware\33.Finding Patient 0.mp4
[41290070f107643f]
|
16,868,720 |
F7444021 |
Advanced Malware Analysis - Ransomware\6.Protecting against Ransomware\36.Summary.mp4
[1bc1eddd45b4c6]
|
1,226,754 |
00DD2ED9 |
Advanced Malware Analysis - Ransomware\6.Protecting against Ransomware\31.Introduction.mp4
[37a39e5767777227]
|
2,721,909 |
C9E0CC73 |
Advanced Malware Analysis - Ransomware\6.Protecting against Ransomware\32.Avoiding Common Pitfalls.mp4
[67601c28d56ee1cb]
|
3,881,505 |
CAE04345 |
Advanced Malware Analysis - Ransomware\6.Protecting against Ransomware\35.Putting Your Skills into Practice.mp4
[4bea8cf5793ef583]
|
3,602,401 |
C3929A78 |
Advanced Malware Analysis - Ransomware\6.Protecting against Ransomware\34.Preventing Future Attacks.mp4
[349eca2ba70a54ba]
|
5,705,737 |
52B2E42C |
Advanced Malware Analysis - Ransomware\5.Analyzing Propagation and Replication Techniques |
0 |
00000000 |
Advanced Malware Analysis - Ransomware\2.Learning How Ransomware Works |
0 |
00000000 |
Advanced Malware Analysis - Ransomware\3.Performing Static Analysis on Compromised Machines |
0 |
00000000 |
Advanced Malware Analysis - Ransomware\1.Course Overview |
0 |
00000000 |
Advanced Malware Analysis - Ransomware\4.Analyzing Early Infection Stages |
0 |
00000000 |
Advanced Malware Analysis - Ransomware\6.Protecting against Ransomware |
0 |
00000000 |
Advanced Malware Analysis - Ransomware |
0 |
00000000 |
|
Total size: |
188,575,716 |
|
|