Browsing the "analysis" Tag

Cuckoo eats ZeuS v2

December 26th, 2011 | ๐Ÿ•’

https://www.ispeech.org/text.to.speech In this video you can see Cuckoo Sandbox analyzing a ZeuS v2 malware sample. You can also taste some


5 Minute Malware Analysis

May 18th, 2011 | ๐Ÿ•’

iSpeech.org Text tutorial: http://technology-flow.com/articles/windows-malware-analysis/ Learn to analyze a suspicious file. You will learn how to find what processes it spawns,


Cuckoo eats Win32.Koobface

May 16th, 2011 | ๐Ÿ•’

iSpeech.org This video shows a demo of Cuckoo 0.2 beta while analyzing several components from the Koobface worm. Enjoy! source


SNORT Log Analysis for Computer Forensics

April 7th, 2011 | ๐Ÿ•’

https://www.ispeech.org Snort Intrusion Detection Forensics demo by Keatron Evans from InfoSec Institute. Resources.InfoSecInstitute.com for Computer Forensics Videos http://resources.infosecinstitute.com Computer Forensics


Introduction to Malware Analysis

February 15th, 2010 | ๐Ÿ•’

iSpeech.org Learn malware analysis fundamentals from the primary author of SANS' course FOR610: Reverse-Engineering Malware (REM). More at http://LearnREM.com. In