RAR-files |
setting.up.a.malware.analysis.lab-rebar.rar |
50,000,000 |
30F8D3EC |
setting.up.a.malware.analysis.lab-rebar.r00 |
50,000,000 |
BBE972E0 |
setting.up.a.malware.analysis.lab-rebar.r01 |
50,000,000 |
CBECC32E |
setting.up.a.malware.analysis.lab-rebar.r02 |
50,000,000 |
3BD9EBF4 |
setting.up.a.malware.analysis.lab-rebar.r03 |
50,000,000 |
9B950AFA |
setting.up.a.malware.analysis.lab-rebar.r04 |
50,000,000 |
B8F24E42 |
setting.up.a.malware.analysis.lab-rebar.r05 |
50,000,000 |
4DCA86A3 |
setting.up.a.malware.analysis.lab-rebar.r06 |
50,000,000 |
367DB03A |
setting.up.a.malware.analysis.lab-rebar.r07 |
50,000,000 |
0F8C172C |
setting.up.a.malware.analysis.lab-rebar.r08 |
50,000,000 |
F8A06ABD |
setting.up.a.malware.analysis.lab-rebar.r09 |
50,000,000 |
A13AF660 |
setting.up.a.malware.analysis.lab-rebar.r10 |
50,000,000 |
11AB9B0F |
setting.up.a.malware.analysis.lab-rebar.r11 |
50,000,000 |
41742810 |
setting.up.a.malware.analysis.lab-rebar.r12 |
50,000,000 |
A3CDEBE6 |
setting.up.a.malware.analysis.lab-rebar.r13 |
50,000,000 |
E7AC5069 |
setting.up.a.malware.analysis.lab-rebar.r14 |
13,554,497 |
59FC5682 |
|
Total size: |
763,554,497 |
|
|
Archived
files |
01 - Course Overview\01 - Course Overview.mp4
[a649d8eee3a83f6f]
|
7,148,189 |
52142CB2 |
02 - Malware Analysis for Security Operations\02 - Why Build Your Own Lab.mp4
[393f1e0f994f5e4b]
|
21,374,552 |
3A05C6E7 |
02 - Malware Analysis for Security Operations\03 - Who Needs to Do This.mp4
[baf42a1e9df60eb9]
|
12,947,963 |
7E39153E |
02 - Malware Analysis for Security Operations\04 - What Skills Are Required.mp4
[fa29c8215e0bf898]
|
13,681,049 |
F43D9010 |
02 - Malware Analysis for Security Operations\05 - Creating a Safe Environment.mp4
[759fe68f963f840a]
|
45,064,289 |
B15F9644 |
02 - Malware Analysis for Security Operations\06 - Choosing a Hypervisor.mp4
[82c942638778a8a8]
|
28,558,629 |
8334374A |
02 - Malware Analysis for Security Operations\07 - Escaping VMs.mp4
[769cfc58f34bb7d]
|
24,842,473 |
C71D8A40 |
02 - Malware Analysis for Security Operations\08 - Choosing Operating Systems.mp4
[437ce0e6028e9cc8]
|
36,826,038 |
2AB5CD10 |
02 - Malware Analysis for Security Operations\09 - Evading Intelligent Malware.mp4
[89509b183a7af01f]
|
15,991,782 |
EFF1283D |
02 - Malware Analysis for Security Operations\10 - Choosing Hardware to Use.mp4
[938eac73200cbf94]
|
40,781,055 |
40DB7DA0 |
03 - Creating a Sacrificial VM\11 - Convincing Malware Hardware Is Real.mp4
[5c5684f5d863d622]
|
31,600,558 |
D469B85E |
03 - Creating a Sacrificial VM\12 - Setting Up the Virtual Machine Networking.mp4
[18d612e18e66ee8]
|
127,105,757 |
3C3CA01A |
03 - Creating a Sacrificial VM\13 - Configuring the Virtual Machine Hardware Settings.mp4
[3e9636f6b324abbe]
|
65,075,714 |
C51DC446 |
04 - Passing Off Your Virtual Machine as the Real Deal\14 - Adjusting to the Situation.mp4
[1f21a2b99718a07f]
|
10,605,196 |
4E8C9F1A |
04 - Passing Off Your Virtual Machine as the Real Deal\15 - Creating a Realistic Operating System.mp4
[4680ea7474019c93]
|
27,819,948 |
57FB507E |
04 - Passing Off Your Virtual Machine as the Real Deal\16 - Knowing the Malware.mp4
[b1ff5cefc96b2b01]
|
31,095,521 |
D298FD45 |
04 - Passing Off Your Virtual Machine as the Real Deal\17 - Simulating User Activity.mp4
[36d9941b2b197f2a]
|
45,525,738 |
43065D94 |
04 - Passing Off Your Virtual Machine as the Real Deal\18 - Working Around VMware Tools.mp4
[891b84aa28a0e5d4]
|
43,594,790 |
B8870CEB |
05 - Choosing Your Load Out\19 - Deciding on Tools.mp4
[8cb3da6d52f5e3f1]
|
35,328,085 |
69827955 |
05 - Choosing Your Load Out\20 - Using Process Explorer.mp4
[c67dc9cf2a832472]
|
18,228,375 |
4E4D44F2 |
05 - Choosing Your Load Out\21 - Using Process Monitor.mp4
[9c8e6885c6abe7b8]
|
9,538,393 |
CA695B5C |
05 - Choosing Your Load Out\22 - Using Regshot and Autoruns.mp4
[8394fdd7fdc9a0c6]
|
13,264,090 |
6E847B0C |
05 - Choosing Your Load Out\23 - Using Fakenet.mp4
[104c4cfe9710bb52]
|
16,676,131 |
0D414440 |
06 - Summary and Recap\24 - Pivoting to Alternative Tools.mp4
[39641ec338a05c2f]
|
8,915,817 |
F0077720 |
06 - Summary and Recap\25 - Preparing to Analyze Malware.mp4
[36a37bb846e1f704]
|
19,393,329 |
3ED4B84C |
setting-up-malware-analysis-lab.zip |
12,565,564 |
E07E7630 |
01 - Course Overview |
0 |
00000000 |
02 - Malware Analysis for Security Operations |
0 |
00000000 |
03 - Creating a Sacrificial VM |
0 |
00000000 |
04 - Passing Off Your Virtual Machine as the Real Deal |
0 |
00000000 |
05 - Choosing Your Load Out |
0 |
00000000 |
06 - Summary and Recap |
0 |
00000000 |
|
Total size: |
763,549,025 |
|
|