Behavioral task
behavioral1
Sample
Introduction-cyber-security.pdf
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Introduction-cyber-security.pdf
Resource
win10v2004-20240508-en
General
-
Target
Introduction-cyber-security.pdf
-
Size
5.0MB
-
MD5
d51a497b43bab69458615814c8aab956
-
SHA1
ab0fdf309312c50c879848b604cea6fa5cbe8727
-
SHA256
b92df48d65cd7aec235a06d60b133e36edd359603f8ca70149b862aee9b58dba
-
SHA512
4ef3f272bddc158fcd5c2e42ec3340fcd323e1e42af6e9e881f7d5e7c821b4f0049a200734cdb76d11623b5b8058ddb462ab2ede077926cd36fb63ae46dd1a4d
-
SSDEEP
98304:LTzv9fThaQZqBjcYD7fcZ5wmo8vbCkEpxS+CFcuCrVTppauW3bmRi1+G86/B9fuU:vz1fThNZkjrD7fYIk4xSy+86z3
Malware Config
Signatures
Files
-
Introduction-cyber-security.pdf.pdf
-
http://Lockdown.co.uk
-
http://Ostel.co
-
http://antivirus.comodo.com
-
http://assampolice.com
-
http://blr.vsnl.net.in
-
http://bol.net.in
-
http://cbi.gov.in
-
http://cbi.nic.in
-
http://ccm.net
-
http://ccm.net/faq/2-how-do-i-know-if-a-website-is-secure
-
http://cidap.gov.in
-
http://cidwestbengal.gov.in
-
http://codebutler.github.com/firesheep/].
-
http://computers.interactiva.org/Security/Authentication/Kerberos/
-
http://countuponsecurity.com/2012/12/21/computer-security-incident-handling-6-steps/
-
http://creativecommons.org/licenses/by-sa/4.0/
-
http://cybercellagra.com
-
http://cybercellmumbai.com
-
http://cybercellmumbai.gov.in
-
http://cybersecuritymanifesto.com
-
http://davenport.sourceforge.net/ntlm.html
-
http://en.wikipedia.org/wiki/Hacker_
-
http://f-droid.org/
-
http://f-droid.org/repository/browse/?fdid=com.csipsimple&fdpage=4
-
http://f-droid.org/repository/browse/?fdid=org.mozilla.firefox
-
http://free-antivirus.eeye.com
-
http://free.avg.com
-
http://gmail.com
-
http://hry.nic.in
-
http://hyd.appolice.gov.in
-
http://jharkhandpolice.gov.in
-
http://kar.nic.in
-
http://kb.cu-portland.edu/Password+Security
-
http://keralapolice.gov.in
-
http://ncrb.gov.in/
-
http://nic.in
-
http://opensourceforu.com
-
http://opensourceforu.efytimes.com/2011/03/digital-forensic-analysis-using-backtrack-part-1/
-
http://opensourceforu.efytimes.com/2015/01/peek-top-password-managers/
-
http://oss-watch.ac.uk/resources/softwarepatch
-
http://ostel.co
-
http://peter.havercan.net/computing/plain-persons-guide-to-secure-sockets-layer.html
-
http://pychatter.wikidot.com/how-it-works
-
http://securityinabox.org
-
http://shaifulaueo.blogspot.in/p/free-antivirus_13.html
-
http://sourceforge.net/projects/moonav/
-
http://static.commentcamarche.net/ccm.net/faq/images/2-sed.png
-
http://thanepolice.org
-
http://uou.ac.in
-
http://vsnl.com
-
http://www.bitdefender.com/PRODUCT-14-en--BitDefender-Free-Edition.html
-
http://www.cidap.gov.in/cybercrimes.aspx
-
http://www.clamwin.com
-
http://www.cyanogenmod.com/
-
http://www.cybercellmumbai.com
-
http://www.cyberpolicebangalore.nic.in
-
http://www.digitalcitizen.life/gain-additional-control-using-windows-firewall-advanced-security
-
http://www.free-av.com
-
http://www.freerav.com
-
http://www.garykessler.net/library/role_of_computer_forensics.html
-
http://www.garykessler.net/library/steganography.html
-
http://www.go4expert.com/articles/understanding-authentication-t8842/
-
http://www.history.com/topics/inventions/invention-of-the-internet
-
http://www.infoworld.com
-
http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet
-
http://www.isfs.org.hk/publications/011009/Collins-CIO&CeO.pdf
-
http://www.isfs.org.hk/publications/ComputerForensics_part1.pdf
-
http://www.livinginternet.com/:
-
http://www.livinginternet.com/e/ew.htm
-
http://www.lockdown.co.uk
-
http://www.lockdown.co.uk/?pg=password_guide
-
http://www.macinstruct.com/node/165
-
http://www.mirc.com
-
http://www.opensourceforu.efytimes.com/wp-content/uploads/2014/10/Figure-1-KeePassX.jpg
-
http://www.opensourceforu.efytimes.com/wp-content/uploads/2014/10/Figure-2-Clipperz.jpg
-
http://www.opensourceforu.efytimes.com/wp-content/uploads/2014/10/Figure-3-Password-Gorilla.jpg
-
http://www.openspf.org/Introduction
-
http://www.pctools.com/free-antivirus/
-
http://www.punepolice.gov.in
-
http://www.symantec.com/avcenter/reference/cyberterrorism.pdf
-
http://www.symantec.com/connect/articles/what-are-malware-viruses-spyware-and-cookies-and-what-differentiates-them
-
http://www.telegraphindia.com/1151207/jsp/business/story_57045.jsp#.VnJcINJ95dg
-
http://www.thanepolice.org
-
http://www.thehindu.com/news/national/govt-launches-crime-tracking-pilot-project/article4272857.ece.
-
http://www.threatfire.com/download/
-
http://www.uou.ac.in
-
http://www.usethistip.com
-
http://www.usethistip.com/2012/11/how-to-identify-fake-email-and-trace.html
-
http://www.utilizewindows.com
-
http://www.utilizewindows.com/7/networking/452-working-with-windows-firewall-in-windows-7
-
http://www.utilizewindows.com/:
-
http://www.wikihow.com
-
http://www.wikihow.com/Choose-an-Internet-Browser
-
http://www.wikihow.com/Clear-Your-Browser%27s-Cache
-
http://www.wikihow.com/Clear-Your-Browser's-Cache
-
http://www.wikihow.com/Reveal-a-Fake-Facebook-Account
-
http://www.wikihow.com/Set-up-2-Step-Verification-in-Gmail
-
http://www.zdnet.com/organised-cybercrime-groups-are-now-as-powerful-as-nations-7000030323/
-
http://yahoo.com
-
https://chatsecure.org/
-
https://en.support.wordpress.com/selecting-a-strong-password/
-
https://en.wikibooks.org/wiki/Introduction_to_Digital_Forensics
-
https://en.wikipedia.org/wiki/Domestic_policy
-
https://en.wikipedia.org/wiki/Government_of_India
-
https://en.wikipedia.org/wiki/India
-
https://en.wikipedia.org/wiki/Interior_ministry
-
https://en.wikipedia.org/wiki/Internal_security
-
https://en.wikipedia.org/wiki/Metadata
-
https://en.wikipedia.org/wiki/Password_Authentication_Protocol
-
https://guardianproject.info/
-
https://guardianproject.info/apps/obscuracam/
-
https://guardianproject.info/apps/proxymob-firefox-add-on/
-
https://guardianproject.info/wiki/OSTN
-
https://ostel.co/
-
https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en
-
https://play.google.com/store/apps/details?id=org.thoughtcrime.redphone
-
https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms
-
https://securityblog.redhat.com/tag/two-factor-authentication/
-
https://securityinabox.org/en/glossary#Tor
-
https://securityinabox.org/en/glossary#apk
-
https://securityinabox.org/en/guide/anonymity-and-circumvention
-
https://securityinabox.org/en/guide/apg/android
-
https://securityinabox.org/en/guide/mobile-phones
-
https://securityinabox.org/en/guide/secure-communication
-
https://securityinabox.org/en/guide/secure-file-storage
-
https://securityinabox.org/en/guide/smartphones
-
https://securityinabox.org/en/guide/social-networking
-
https://survival.tacticaltech.org/internet/email/tips
-
https://upload.wikimedia.org/wikipedia/commons/2/2b/Digital_Signature_diagram.svg
-
https://upload.wikimedia.org/wikipedia/commons/5/5b/Firewall.png
-
https://upload.wikimedia.org/wikipedia/commons/b/b8/Seformatbmp-embedding_full.png
-
https://upload.wikimedia.org/wikipedia/commons/b/bc/Public_key_encryption_keys.png
-
https://www.avast.com/index
-
https://www.communications.gov.au
-
https://www.communications.gov.au/what-we-do/internet/stay-smart-online/your-identity/recognise-scam-or-hoax-emails-and-websites
-
https://www.flickr.com/photos/alamagordo/2372928527
-
https://www.flickr.com/photos/thomasguest/3027199004
-
https://www.qld.gov.au/law/your-rights/consumer-rights-complaints-and-scams/consumer-advice-rights-and-responsibilties/tips-to-become-a-smarter-shopper/tips-for-buying-online/
-
https://www.torproject.org/docs/android.html.en
-
https://www.us-cert.gov/sites/default/files/publications/forensics.pdf
-
https://www.youtube.com/watch?v=-CeuqCHX7tE
-
https://www.youtube.com/watch?v=-jHs-RYD7gc
-
https://www.youtube.com/watch?v=A9O0zYv-5d0
-
https://www.youtube.com/watch?v=CStMHLQWa_8
-
https://www.youtube.com/watch?v=EFHfg1bfgVc
-
https://www.youtube.com/watch?v=H0g8xJMnT68
-
https://www.youtube.com/watch?v=Jmszt__J204
-
https://www.youtube.com/watch?v=KCObM4PBTVk
-
https://www.youtube.com/watch?v=MFyPg2Flf8s
-
https://www.youtube.com/watch?v=QUyla_nMJis
-
https://www.youtube.com/watch?v=V8bCyRCqK0k
-
https://www.youtube.com/watch?v=WprjZyY8ZuY
-
https://www.youtube.com/watch?v=_WHynHcXm7c
-
https://www.youtube.com/watch?v=a9q-tDRCTtc
-
https://www.youtube.com/watch?v=aktovPyT0iM
-
https://www.youtube.com/watch?v=cdRbvO_MXh4
-
https://www.youtube.com/watch?v=gNiz4kfSZnw
-
https://www.youtube.com/watch?v=hkzHtEnFZpc
-
https://www.youtube.com/watch?v=iNWUtj9qhPo
-
https://www.youtube.com/watch?v=krbivwp4t3U
-
https://www.youtube.com/watch?v=mYhJyVKjai4
-
https://www.youtube.com/watch?v=o0a09CQi_48
-
https://www.youtube.com/watch?v=sr7mgYD2tAc
-
https://www.youtube.com/watch?v=tkgLHoaFeFk
-
https://www.youtube.com/watch?v=wbzP2-qvc4o
-
https://www.youtube.com/watch?v=xCHTmzfsGmI
-
https://www.youtube.com/watch?v=xex1h93fnI8
-
https://youtu.be/COU5T-Wafa4
-
https://youtu.be/Xhmae4_fG2o
-
https://youtu.be/cUH3tQbGj4A
-
https://youtu.be/hYyWgPXfx9U
- Show all
-