COMPUTER VIRUS: FORENSIC ANALYSIS TOOLS AND RELATED LINKS


VIRUSES: STUDY

!!!!!FOR INSTRUCTIONAL PURPOSES ONLY!!!!

I want to take a moment and remind all coders and scriptors that inserting and running of malicious files or data on anyone’s computer besides your own is ILLEGAL! And, depending on your age, can end you up in Prison!

These tutorials are intended for computer forensic students, network professionals or network professional students, white hat hackers and the like… They are not meant for harm or ill… File it under “know thy enemy”… Before trying anything written here it is recommended that you install a virtual machine on a test pc that is not connected to your network or the internet and test your knowledge in that environment.  Even so, it is still possible to turn your computer into a brick.  So get yourself a cheapie computer for such testing…

TYPES OF VIRUSES I

TYPES OF VIRUSES II

FREE COMPUTER VIRUS SAMPLES I

FREE COMPUTER VIRUS SAMPLES II

VIRUSES WRITTEN IN WHAT LANGUAGE???

GENERAL OVERVIEW OF HOW TO WRITE A VIRUS

ASSEMBLY: VIRUS STUDY

BOTNET: VIRUS STUDY

C: VIRUS STUDY I

C: VIRUS STUDY II

C++: VIRUS STUDY

C#: VIRUS STUDY

COOKIE STEALING: VIRUS STUDY

EMAIL: VIRUS STUDY I

EMAIL: VIRUS STUDY II

EMAIL: VIRUS STUDY III

FORM BOT: VIRUS STUDY I

FORM BOT: VIRUS STUDY II

JAVA: VIRUS STUDY

KEYLOGGER: VIRUS STUDY I

KEYLOGGER: VIRUS STUDY II

NOTEPAD: VIRUS STUDY

POWERSHELL: VIRUS STUDY

PYTHON: VIRUS STUDY

ROOTKIT: VIRUS STUDY I

ROOTKIT: VIRUS STUDY II

ROOTKIT: VIRUS STUDY III

SQL SERVER CORRUPTION: VIRUS STUDY I

SQL SERVER CORRUPTION: VIRUS STUDY II

TROJAN: VIRUS STUDY

VB SCRIPT: VIRUS STUDY

WEB CRAWLER: VIRUS STUDY

WORM: VIRUS STUDY

TYPES OF CYBER ATTACKS

CYBER ATTACKS: STUDY I

CYBER ATTACKS: STUDY II

SYSTEM VULNERABILITIES: STUDY I

BUFFER OVERFLOW: STUDY I

BUFFER OVERFLOW: STUDY II

COMMON VULNERABILITIES AND EXPOSURES LIST

NATIONAL SECURITY VULNERABILITY DATABASE

VIRUS TRACKING

HOW TO USE WINDOWS EVENT LOG TO SEE WHAT A VIRUS DID

VIEW WHICH FILES WERE OPENED AND CLOSED I

VIEW WHICH FILES WERE OPENED AND CLOSED II

REAL TIME OPEN CLOSING OF FILES MONITIORING

SUSPICIOUS FILE ANALYSIS

ISOLATED TEST ENVIRONMENT

HOW TO RUN A PROGRAM IN WINDOWS 10 SANDBOX

FREE AND PAID SANDBOX PROGRAMS FOR WINDOWS

HOW TO SETUP VIRTUAL MACHINE

VIRTUAL MACHINE AND MALWARE / VIRTUAL MACHINE BEST PRACTICES

HONEYPOTS

HONEYPOTS: SETUP AND STUDY

OPENSOURCE HONEYPOTS

EXHAUSTIVE LIST OF HONEYPOTS

FORENSIC TOOLS

SELENIUM : WEB BROWSER AUTOMATOR

OVERVIEW OF WHAT KALI LINUX IS GOOD FOR

KALI TUTORIAL

FORENSIC LINUX DISTRIBUTIONS

HOW TO ANALYZE QUARANTINED FILES

USEFUL COMPUTER FORENSICS TUTORIALS

FORENSIC INVESTIGATION TOOLS I

FORENSIC INVESTIGATION TOOLS II

FORENSIC INVESTIGATION TOOLS III

FORENSIC INVESTIGATION TOOLS IV

FORENSIC INVESTIGATION TOOLS V

ANTIVIRUS STUDY

AVAST TOOL TO DECOMPILE VIRUS(SOME ASSEMBLY NEEDED)

VIRUS SIGNATURE: STUDY I

VIRUS SIGNATURE: STUDY II

VIRUS SIGNATURE: STUDY III

ANTIVIRUS PROGRAM: STUDY I

ANTIVIRUS PROGRAM: STUDY II

ANTIVIRUS PROGRAM: STUDY III

ANTIVIRUS PROGRAM: STUDY IV

ANTIVIRUS SCANNING STATION STUDY

SITES FOR INFO ON CYBER SECURITY

CYBERWORLD

F-SECURE

SHODAN

NCSC

REDDIT ( in particular — r/infosec r/sysadmin r/crypto r/cybersecurity r/opsec r/privacy r/intelligence and for advice, r/asknetsec)

BLEEPING COMPUTERS

TECHWORLD

NOMORERANSOM

KREBSONSECURITY

DIGITAL ATTACK MAP

OSINT FRAMEWORK

US-CERT

UK-CERT

CVE DATABASE

BREACH LEVEL INDEX(BLI)

THREATPOST

SECURELIST

VIRUSTOTAL

SECURITYWEEKLY

SITES FOR INFO ON HACKING

HACK5 FORUMS

TINKERNUT

CYBERPUNK

HACKER9

EXPLOIT DATABASE

DARKNET

HACKADAY

EVIL ZONE

HACK THIS SITE

HACK FORUMS

SECURITEAM

BREAK THE SECURITY (YOUTUBE CHANNEL)

BREAK THE SECURITY (WEBSITE)

SECTOOLS

HACK IN THE BOX

 

 

This entry was posted in Network, Notes, PC Support and tagged , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>