45 min listen
Unavailable
Currently unavailable
2015-028: using log analytics to discover Windows malware artifacts
Currently unavailable
2015-028: using log analytics to discover Windows malware artifacts
ratings:
Length:
45 minutes
Released:
Jun 29, 2015
Format:
Podcast episode
Description
In this podcast, you'll learn about:
Log analytics software that can be used to parse system logs for naaty malware
Detecting Malware artifacts
learn about windows directory locations
looking for indicators like packing, changed hashes, etc
Tips for capturing malware using tools like RoboCopy
Learn about what code caves are and how malware hides inside them (http://www.codeproject.com/Articles/20240/The-Beginners-Guide-to-Codecaves)
SANS DFIR poster - https://www.sans.org/security-resources/posters/windows-forensics-evidence-of-75
Log analytics software that can be used to parse system logs for naaty malware
Detecting Malware artifacts
learn about windows directory locations
looking for indicators like packing, changed hashes, etc
Tips for capturing malware using tools like RoboCopy
Learn about what code caves are and how malware hides inside them (http://www.codeproject.com/Articles/20240/The-Beginners-Guide-to-Codecaves)
SANS DFIR poster - https://www.sans.org/security-resources/posters/windows-forensics-evidence-of-75
Released:
Jun 29, 2015
Format:
Podcast episode
Titles in the series (100)
2020-018- Masha Sedova, bespoke security training, useful metrics to tailor training: Masha Sedova - Founder, Elevate Security Inability to measure human security behaviors leads to increased risk in our computing environments. For too long, we’ve accepted training completion and mock phishing data as a sufficient way to measure this... by BrakeSec Education Podcast