Wubi Posted August 6, 2012 Report Posted August 6, 2012 (edited) 1. Welcome to the first TekTip episode from TekDefense.com. In this episode we talk about and demo basic dynamic malware analysis. Tools we leveraged here include VMWare Workstation, Sysinternal Suite, Netcat, ApateDNS, Wireshark, Regshot.2. Welcome to TekTip episode 2 from TekDefense.com. In this episode we will continue our discussions on basic dynamic malware analysis. We will be focusing on FakeNet.3. In this episode of TekTip we take a break from Malware Analysis and play with an old sys admin trick commonly known as the Sticky Keys trick. I cannot tell you how many times I have used this to log into lockedout machines from family, friends, co-workers, and clients. This will work on XP, server 2003, Vista, Windows 7, and probably the rest of them as well. A quick summarry of the steps involved are:Boot to a live linux distro (BT5 will work fine) Mount the windows drive Replace sethc.exe with cmd.exe Reboot to Windows Press shift 5 times to bring up command prompt. Command prompt aquired, mission accomplished. Edited August 13, 2012 by Wubi Quote