PLU | Malware Analysis And Detection: Trickbot (2019 EN)

Discussion in 'Information Technology' started by Kanka, Nov 22, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,037
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Tyler Hudak, Aaron Rosenmund
    Full Title: Malware Analysis And Detection: Trickbot
    Year: 2019
    Language: English
    Genre: Educational: Security
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Exercise Files, Subtitles .SRT)
    Time: 01:29:35
    Video: AVC, 1280 x 720 (1.778) at 29.000 fps, 600 kbps
    Audio: AAC at 96 Kbps, 2 channels, 48.0 KHz



    In this course, you’ll learn what the malware TrickBot is and how you can analyze it to determine what it does on systems it compromises.

    In this course, Malware Analysis and Detection: TrickBot, Aaron Rosenmund and Tyler Hudak discuss the malware TrickBot, a popular malware used by attackers. By the end of this course, you will learn how TrickBot works, what it does to computers it compromises, and what tools you can use to detect it on your hosts and network.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Introducing Trickbot
    02. Introduction
    03. What TrickBot Leads To
    04. TrickBot Initial Foothold and Lateral Movement
    05. Who Is Running TrickBot and What Do They Do?
    06. TrickBot Defenses
    3. Dynamic Analysis in the Lab
    07. Analysis Preparation
    08. Running TrickBot
    09. Analyzing TrickBot Changes with RegShot
    10. Analyzing TrickBot Behavior with Process Monitor
    11. TrickBot Persistence
    12. TrickBot Files
    4. Obtaining TrickBot Configuration and Files
    13. TrickBot Plugins
    14. Decrypting TrickBot Plugins
    15. Detecting TrickBot Compromised Systems
    5. Detecting TrickBot Indicators on Your Network
    16. Network Monitoring Considerations
    17. Analyzing TrickBot Network Traffic with Zeek
    18. Utilizing Zeek and JA3 to Analyze SSL Network Traffic
    19. Network Detection and Protection Techniques
    20. Utilizing Wireshark for TrickBot Network Analysis
    6. Summary and Recap
    21. Summary


    -------------