Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 09/02/13 in all areas

  1. Sunt relativ (foarte) nou in stiinta virusologiei. Am descoperit cam cu 2-3 saptamani in urma pe facebook un prieten care se plangea ca trimitea linkuri dubioase pe chat la toata lumea. S-ar fi infectat dupa ce ar fi facut nus ce prin grecia. Am analizat unul din linkuri: TUV Austria Hellas (Probail website compromis) Si am aflat ca facea redirect catre o pagina de downlaod care continea fisierul asta: GirlShare - Download Photo_014-www.facebook.com.rar (anti AV scan) Din lipsa de timp si cunostinte nu am apucat sa analizez fisierul. Daca tot s-a deschis categoria asta am zis sa postez pentru cei interesati.
    1 point
  2. Hello all malware hunters, I'd like to make a list of tools you can use to analyze malware so if you know them let us know. [table] [tr][td]Name[/td][td]Description[/td][/tr] [tr][td]Process Monitor[/td][td]Process Tracer[/td][/tr] [tr][td]Process Explorer[/td][td]Process Explorer[/td][/tr] [tr][td]Sysanalyzer[/td][td]Analyzer[/td][/tr] [tr][td]VirusTotal[/td][td]Online Virusscanner(s)[/td][/tr] [tr][td]Malzilla[/td][td]Web proxy[/td][/tr] [tr][td]CIMA[/td][td]Online Malware Analyzer[/td][/tr] [tr][td]ThreatExpert[/td][td]Online Malware Analyzer[/td][/tr] [tr][td]Anubis[/td][td]Online Malware Analyzer[/td][/tr] [tr][td]CWSandbox[/td][td]Online Malware Analyzer[/td][/tr] [tr][td]Wireshark[/td][td]Network Packet Analyzer[/td][/tr] [tr][td]oSpy[/td][td]Reverse Engineering[/td][/tr] [tr][td]HashMyFiles[/td][td]File Hasher[/td][/tr] [tr][td]FileAlyzer[/td][td]File Information Analyzer[/td][/tr] [tr][td][/td][/tr][tr][td][/td][/tr] [tr][td]Scanners[/td][td]Description[/td][/tr] [tr][td]Autoruns[/td][td]Startup Locations Manager[/td][/tr] [tr][td]Hijackthis[/td][td]Startup Scanner[/td][/tr] [tr][td]RunAlyzer[/td][td]Startup Scanner[/td][/tr] [tr][td]psc-exam[/td][td]Startup scanner[/td][/tr] [tr][td]OSAM Autorun Manager[/td][td]Startup Malware Scanner[/td][/tr] [tr][td]a-squared HijackFree[/td][td]Startup Malware Scanner[/td][/tr] [tr][td]Avast anti-rootkit[/td][td]Rootkit scanner[/td][/tr] [tr][td]BlackLight[/td][td]Rootkit scanner[/td][/tr] [tr][td]GMER[/td][td]Rootkit scanner[/td][/tr] [tr][td]Rootkit Hook Analyzer[/td][td]Rootkit scanner[/td][/tr] [tr][td]Rootrepeal[/td][td]Rootkit scanner[/td][/tr] [tr][td]AVZ[/td][td]Behaviour scanner[/td][/tr] [/table] Misc Tools: Unlocker Raw Registry Editor - Project forge - reboot.pro Links to learn: Tutorials, Papers, Dissertations, Essays and Guides / Downloads - Tuts 4 You
    1 point
  3. Malware Samples http://urlquery.net/ http://malwaretips.com/Forum-Virus-Exchange http://www.malwaredomainlist.com/mdl.php http://www.malwareblacklist.com/showMDL.php http://support.clean-mx.de/clean-mx/viruses.php http://malc0de.com/database/ https://zeustracker.abuse.ch/monitor.php?browse=binaries http://amada.abuse.ch/palevotracker.php http://www.sacour.cn/showmal.asp?month=8year=2012 http://malwaredb.malekal.com/ http://www.scumware.org http://www.threatlog.com http://minotauranalysis.com/exetweet/ http://minotauranalysis.com/malwarelist.php Bloguri http://www.xylibox.com/ http://malwageddon.blogspot.fr/ http://krebsonsecurity.com/ http://www.bleepingcomputer.com/ Twitter @Xylitol @Trojan7Sec @briankrebs @MalwareMustDie
    1 point
  4. About the CEH: The Certified Ethical Hacker is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council.) An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (i.e., gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the victim system(s) or network(s) is not. A Certified Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker. Whats inside: Module 01: Introduction to Ethical Hacking Module 02: Footprinting and Reconnaissance Module 03: Scanning Networks Module 04: Enumeration Module 05: System Hacking Module 06: Trojans and Backdoors Module 07: Viruses and Worms Module 08: Sniffers Module 09: Social Engineering Module 10: Denial of Service Module 11: Session Hijacking Module 12: Hacking Webservers Module 13: Hacking Web Applications Module 14: SQL Injection Module 15: Hacking Wireless Networks Module 16: Hacking Mobile Platforms Module 17: Evading IDS, Firewalls, and Honeypots Module 18: Buffer Overflow Module 19: Cryptography Module 20: Penetration Testing + CEHv8 References + 18 Labs Modules Sursa & Download: http://kickass.to/ceh-v-8-course-notes-t7584714.html Tools: EC-Council: Certified Ethical Hacker CEH v8 (Tools) (download torrent) - TPB
    1 point
×
×
  • Create New...