Behavioral task
behavioral1
Sample
96ed9d719d14a2157a81578bfac7918b83dce09dc0914faf0cc0748fcdb5ba5c.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96ed9d719d14a2157a81578bfac7918b83dce09dc0914faf0cc0748fcdb5ba5c.pdf
Resource
win10v2004-20240226-en
General
-
Target
96ed9d719d14a2157a81578bfac7918b83dce09dc0914faf0cc0748fcdb5ba5c
-
Size
155KB
-
MD5
9b4ddffb1f3cde4d2377c239e4753b0f
-
SHA1
92c5051db1d7e46ddf7329ea10cb72e8060d20b6
-
SHA256
96ed9d719d14a2157a81578bfac7918b83dce09dc0914faf0cc0748fcdb5ba5c
-
SHA512
f660bda25580dd319e2e0ac415374e442f6091e361ca9a0862545865c3b5b9b5bf16c913f77f8387626d646c58e0ddbebfc6cc2c6ebf37d6f2d0c9a4cbc5af1c
-
SSDEEP
3072:NgqYUIRGuUs6+kJikQcRA/Q6/SAdLt1YQZFN9ZwyezedCi:pYUqGuUl9MkQz/Q6vLZFNvLki
Malware Config
Signatures
Files
-
96ed9d719d14a2157a81578bfac7918b83dce09dc0914faf0cc0748fcdb5ba5c.pdf
-
https://mattchw.medium.com/overview-of-operating-system-cc3f6f6bb062
-
https://developer.mozilla.org/en-US/docs/Learn/Getting_started_with_the_web/How_the_Web_works
-
https://www.geeksforgeeks.org/client-server-model/
-
https://doc.oroinc.com/api/http-methods/
-
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers
-
https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies
-
https://developer.mozilla.org/en-US/docs/Web/HTTP/Status
-
https://www.techtarget.com/searchsecurity/definition/cryptosystem
-
https://en.wikipedia.org/wiki/Key_exchange
-
https://preyproject.com/blog/en/types-of-encryption-symmetric-or-asymmetric-rsa-or-aes/
-
https://www.techtarget.com/searchdatamanagement/definition/hashing
-
https://www.techtarget.com/searchsecurity/definition/steganography
-
https://www.redhat.com/en/topics/virtualization/what-is-virtualization
-
https://www.dell.com/en-us/dt/learn/cloud/cloud-workloads.htm
-
https://k21academy.com/amazon-web-services/aws-solutions-architect/cloud-service-models/
-
https://www.geeksforgeeks.org/cloud-deployment-models/
-
https://www.bmc.com/blogs/cloud-availability-regions-zones/
-
https://www.cloudflare.com/learning/cloud/what-is-a-virtual-private-cloud/
-
https://www.fugue.co/blog/cloud-network-security-101-aws-security-groups-vs-nacls
-
https://linuxconfig.org/bash-scripting-tutorial-for-beginners
-
https://docs.microsoft.com/en-us/learn/modules/script-with-powershell/
-
https://owasp.org/www-community/vulnerabilities/
-
https://owasp.org/www-project-top-ten/
-
https://www.redteamsecure.com/blog/the-most-common-types-of-network-vulnerabilities
-
https://www.fireeye.com/current-threats/what-is-a-zero-day-exploit.html
-
https://awakesecurity.com/glossary/third-party-risk/
-
https://www.ncsc.gov.uk/guidance/penetration-testing
-
https://www.redscan.com/news/types-of-pen-testing-white-box-black-box-and-everything-in-between/
-
https://owasp.org/www-project-web-security-testing-guide/latest/3-The_OWASP_Testing_Framework/1-Penetration_Testing_Methodologies
-
https://www.geeksforgeeks.org/difference-between-sast-and-dast/
-
https://www.balbix.com/insights/what-is-vulnerability-scanning/
-
https://sansorg.egnyte.com/dl/FEu5gTJa29
-
https://www.pentesteracademy.com/course?id=47
-
https://www.techtarget.com/searchsoftwarequality/definition/reverse-engineering
-
https://www.techtarget.com/searchsecurity/definition/buffer-overflow
-
https://www.crowdstrike.com/cybersecurity-101/malware/malware-analysis/
-
https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
-
https://attack.mitre.org/
-
https://www.techtarget.com/whatis/definition/red-teaming
-
https://www.redteamsecure.com/approach/red-teaming-methodology
-
https://securitytrails.com/blog/red-team-tools
-
https://www.comptia.org/content/articles/what-is-a-security-operations-center
-
https://www.eccouncil.org/what-is-digital-forensics/
-
https://www.cloudcodes.com/blog/casb-integrated-with-siem.html
-
https://www.crowdstrike.com/cybersecurity-101/incident-response/
-
https://www.sumologic.com/glossary/log-analysis/
-
https://securitytrails.com/blog/blue-team-tools
-
https://www.nist.gov/industry-impacts/cybersecurity-framework
-
https://www.nist.gov/cyberframework
-
https://docs.microsoft.com/en-us/compliance/regulatory/offering-cis-benchmark
-
https://www.itgovernance.co.uk/blog/understanding-the-differences-between-iso-27001-and-iso-27002
-
https://www.techtarget.com/searchsecurity/definition/PCI-DSS-Payment-Card-Industry-Data-Security-Standard
-
https://www.techtarget.com/searchhealthit/definition/HIPAA
-
https://gdpr.eu/what-is-gdpr/
-
https://letsdefend.io/
-
https://portswigger.net/web-security
-
http://tryhackme.com/
-
http://hackthebox.eu/
-
https://www.youtube.com/c/13cubed
-
https://www.youtube.com/user/Computerphile
-
https://www.youtube.com/c/PwnFunction
-
https://www.youtube.com/c/LiveOverflow
-
https://www.youtube.com/c/TheCyberMentor
-
https://www.youtube.com/c/HackerSploit
-
https://www.youtube.com/c/JohnHammond010
-
https://www.youtube.com/user/Nourelhoda2011
-
https://fr.b-ok.africa/book/5612160/a579a6
-
https://fr.b-ok.africa/book/3618875/1cb16a
-
https://fr.b-ok.africa/book/2867237/08799e
-
https://fr.b-ok.africa/book/1170863/41ef85
-
https://fr.b-ok.africa/book/5326675/33c8c2
-
https://fr.b-ok.africa/book/3525893/451b52
-
https://fr.b-ok.africa/book/2482934/27a641
-
https://fr.b-ok.africa/book/1274723/254e0e
-
https://www.youtube.com/playlist?list=PLxbwE86jKRgMpuZuLBivzlM8s2Dk5lXBQ
-
https://www.youtube.com/watch?v=As6g6IXcVa4&list=PLG49S3nxzAnlCJiCrOYuRYb6cne864a7G
-
https://www.youtube.com/watch?v=9NE33fpQuw8&list=PLG49S3nxzAnkL2ulFS3132mOVKuzzBxA8
-
https://www.rcboe.org/cms/lib/GA01903614/Centricity/Domain/4399/Network%20n10-007.pdf
-
https://fr.b-ok.africa/book/11653171/5377b1
- Show all
-