zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Advanced Malware Analysis Ransomware
magnet:?xt=urn:btih:e0b2a9db3c475ba1e0dbfd55074d5ab7694736b0&dn=Advanced Malware Analysis Ransomware
磁力链接详情
Hash值:
e0b2a9db3c475ba1e0dbfd55074d5ab7694736b0
点击数:
128
文件大小:
165.9 MB
文件数量:
36
创建日期:
2022-5-15 20:54
最后访问:
2024-12-28 04:55
访问标签:
Advanced
Malware
Analysis
Ransomware
文件列表详情
3 - Performing_Static_Analysis_on_Compromised_Machines/16. DEMO_-_Analyzing_a_Wannacry_Infected_Machine.mp4 20.9 MB
2 - Learning_How_Ransomware_Works/02. Introduction.mp4 1.6 MB
2 - Learning_How_Ransomware_Works/03. What_You_Already_Know_About_Ransomware.mp4 3.77 MB
2 - Learning_How_Ransomware_Works/04. Building_a_Ransomware_Analysis_Lab.mp4 7.48 MB
2 - Learning_How_Ransomware_Works/05. Understanding_Ransomware_Building_Blocks.mp4 2.93 MB
2 - Learning_How_Ransomware_Works/06. Understanding_the_Crypto_Behind_Ransomware.mp4 4.35 MB
2 - Learning_How_Ransomware_Works/07. Analyzing_Open_Source_Ransomware.mp4 9.92 MB
2 - Learning_How_Ransomware_Works/08. Module_Summary.mp4 2.01 MB
3 - Performing_Static_Analysis_on_Compromised_Machines/09. Introduction.mp4 1.96 MB
3 - Performing_Static_Analysis_on_Compromised_Machines/10. Acquiring_Digital_Evidence.mp4 3.54 MB
3 - Performing_Static_Analysis_on_Compromised_Machines/11. Analyzing_Compromised_Machines.mp4 3.89 MB
3 - Performing_Static_Analysis_on_Compromised_Machines/12. Working_with_Memory_Images.mp4 2.37 MB
3 - Performing_Static_Analysis_on_Compromised_Machines/13. Hunting_for_Basic_Indicators.mp4 3.15 MB
3 - Performing_Static_Analysis_on_Compromised_Machines/14. Leveraging_OSINT.mp4 4.9 MB
3 - Performing_Static_Analysis_on_Compromised_Machines/15. Hunting_with_Yara.mp4 3.75 MB
1 - Course_Overview/01. Course_Overview.mp4 4.38 MB
3 - Performing_Static_Analysis_on_Compromised_Machines/17. Summary.mp4 1.28 MB
4 - Analyzing_Early_Infection_Stages/18. Introduction.mp4 1.73 MB
4 - Analyzing_Early_Infection_Stages/19. Learning_the_Tools.mp4 3.34 MB
4 - Analyzing_Early_Infection_Stages/20. Ransomware_and_the_Volume_Shadow_Copy_Service.mp4 4.16 MB
4 - Analyzing_Early_Infection_Stages/21. Analyzing_Kill_Switches.mp4 8.16 MB
4 - Analyzing_Early_Infection_Stages/22. Stopping_Bad_Rabbit_Ransomware.mp4 9.78 MB
4 - Analyzing_Early_Infection_Stages/23. Summary.mp4 1.24 MB
5 - Analyzing_Propagation_and_Replication_Techniques/24. Introduction.mp4 2.6 MB
5 - Analyzing_Propagation_and_Replication_Techniques/25. Analyzing_Propagation_through_Exploits.mp4 2.46 MB
5 - Analyzing_Propagation_and_Replication_Techniques/26. Analyzing_Propagation_through_Removable_Media.mp4 2.97 MB
5 - Analyzing_Propagation_and_Replication_Techniques/27. Analyzing_Propagation_through_File_Shares.mp4 1.68 MB
5 - Analyzing_Propagation_and_Replication_Techniques/28. Analyzing_Malicious_Shortcuts.mp4 1.32 MB
5 - Analyzing_Propagation_and_Replication_Techniques/29. Demo_-_Improving_Ransomware_Analysis_Techniques.mp4 10.87 MB
5 - Analyzing_Propagation_and_Replication_Techniques/30. Summary.mp4 979.1 KB
6 - Protecting_against_Ransomware/31. Introduction.mp4 2.6 MB
6 - Protecting_against_Ransomware/32. Avoiding_Common_Pitfalls.mp4 3.7 MB
6 - Protecting_against_Ransomware/33. Finding_Patient_0.mp4 16.09 MB
6 - Protecting_against_Ransomware/34. Preventing_Future_Attacks.mp4 5.44 MB
6 - Protecting_against_Ransomware/35. Putting_Your_Skills_into_Practice.mp4 3.44 MB
6 - Protecting_against_Ransomware/36. Summary.mp4 1.17 MB
其他位置