Behavioral task
behavioral1
Sample
comptia-cysa-study-guide-exam-cs0-003-3nbsped-1394182902-9781394182909.pdf
Resource
win10v2004-20240508-es
General
-
Target
comptia-cysa-study-guide-exam-cs0-003-3nbsped-1394182902-9781394182909.pdf
-
Size
24.7MB
-
MD5
0bb3880374c34f734476f8a6b8d32ce9
-
SHA1
11c5ad59584f5d30a4ef33f18b6446382c475698
-
SHA256
36228075507621ac002671abbc5838b43b17eae2fd801df5086c3d495b1f2f6b
-
SHA512
26662617843545136a67009b39bb4230400f954b29628ab5cb3801b51ffd85ac15fa1bbe02a9299b2d92995fbfc3c19ca95ce1b2b32b6ab74de43b10c30f2ea5
-
SSDEEP
393216:LcpSKqqyR/kM7FyA7otZ9nGMMzsstL7Fp7Fn7F47F+7FK7FQ7F37Ff7Fh7Ft7FPi:op3KMIwRtm4ETVeokG1Rr39HoP4zQ
Malware Config
Signatures
Files
-
comptia-cysa-study-guide-exam-cs0-003-3nbsped-1394182902-9781394182909.pdf.pdf
Password: testing
-
http://.activecountermeasures.com/simulating-
-
http://.alienvault.com
-
http://.cftt.nist.gov/hardware_write_block.htm.
-
http://.copyright.com
-
http://.cpni.gov.uk
-
http://.dmarcanalyzer.com/spf.DMARC
-
http://.hping.org
-
http://.isecom.org/OSSTMM.3.pdf.
-
http://.joesandbox.com
-
http://.lockheedmartin.com/content/dam/lockheed-
-
http://.macvendors.com
-
http://.postgresql.org/wiki/Monitoring,
-
http://.wa.gov
-
http://036Senki.org
-
http://036Threatfeeds.io
-
http://118Senki.org
-
http://138Senki.org
-
http://141Threatfeeds.io
-
http://3600zonetransfer.me
-
http://BankofAmerica.com
-
http://CertMike.com
-
http://DirtyCOW.ninja
-
http://Exercises.com
-
http://LoginRadius.com
-
http://Microsoft.com
-
http://RODEO.zip
-
http://SouthwestWifi.com
-
http://Wiley.com
-
http://apple-icloud-mx.com
-
http://archive.nist.gov/data_leakage_case/data-
-
http://attack.mitre.org
-
http://bankofamerica.com
-
http://bbc.co.uk
-
http://cdn.iphonehacks.com
-
http://certmike.com
-
http://cheatsheetseries.owasp.org/cheatsheets/SAML_Security_
-
http://cheatsheetseries.owasp.org/cheatsheets/SAML_Security_Cheat_Sheet.html
-
http://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html
-
http://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html.
-
http://cmdzonetransfer.me
-
http://cscglobal.com
-
http://csrc.nist.gov/projects/security-
-
http://csrc.nist.gov/projects/security-content-automation-protocol
-
http://csrc.nist.gov/publications/drafts/nistir-
-
http://csrc.nist.gov/publications/drafts/nistir-8006/draft_nistir_8006.pdf
-
http://csrc.nist.gov/publications/nistpubs/800-
-
http://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdf
-
http://cuckoosandbox.org/
-
http://cuckoosandbox.org/.Both
-
http://demo-powa.anayrat.info
-
http://digi.ninja/projects/zonetransferme.php
-
http://digi.ninja/projects/zonetransferme.php.
-
http://digital-forensics.sans.org/community/downloads
-
http://digital-forensics.sans.org/media/dfir_poster_2014.pdf
-
http://domain.name
-
http://efianalytics.com
-
http://exercise7_1_clone.md
-
http://exercise7_1_original.md
-
http://exploit-exercises.com
-
http://expressions.info/quickstart.html
-
http://forensics.sans.org/community/downloads.1.
-
http://forensics.sans.org/media/dfir_
-
http://forensicswiki.org
-
http://go.microsoft.com/fwlink/?LinkID=135170.At
-
http://google.com
-
http://hackertarget.com/tcpdump-
-
http://hacking-lab.com
-
http://hello.ps
-
http://hello.py
-
http://infosec.ucf.edu/wp-
-
http://infosec.ucf.edu/wp-content/uploads/sites/2/2019/07/Procedure_for_Windows_Incident_Response.pdf
-
http://jku845.com
-
http://lab.com
-
http://loginradius.com
-
http://mediatemple.net/community/products/dv/204643950/understanding-
-
http://mediatemple.net/community/products/dv/204643950/understanding-an-email-header
-
http://microsoft.com
-
http://msdn.microsoft.com/en-
-
http://msdn.microsoft.com/en-us/library/bb897402.aspx
-
http://msdn.microsoft.com/en-us/library/windows/hardware/mt219729(v=vs.85).aspx
-
http://mx.com
-
http://mxtoolbox.com/EmailHeaders.aspx
-
http://mxtoolbox.com/EmailHeaders.aspx.
-
http://notes.langdale.com
-
http://nsztm1.digi.ninja
-
http://nsztm1.digi.ninja.robin.digi.ninja
-
http://nsztm1.digi.ninja.zonetransfer.me
-
http://nsztm2.digi.ninja
-
http://nsztm2.digi.ninja.zonetransfer.me
-
http://nvd.nist.gov/vuln-
-
http://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
-
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST
-
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
-
http://ocio.wa.gov
-
http://open.github.io/cti-
-
http://owasp.org/www-
-
http://owasp.org/www-project-top-ten
-
http://pentesterlab.com/exercises
-
http://pentesterlab.com/exercises.Since
-
http://powa.anayrat.info
-
http://project.org/feeds,
-
http://publish.illinois.edu
-
http://publish.illinois.edu/kericker/files/2013/09/NCDIR-TR-2008-01.pdf
-
http://robin.digi.ninja
-
http://security.com/metasploit-
-
http://senki.org
-
http://sourceforge.net
-
http://sourceforge.net/projects/metasploitable
-
http://southwestwifi.com
-
http://standard.org/index.php/Main_Page
-
http://store.comptia.org
-
http://technet.microsoft.com/en-
-
http://technet.microsoft.com/en-us/sysinternals
-
http://txt_dmarc.sendgrid.net
-
http://wazuh.com
-
http://whois.com
-
http://whois.corporatedomains.com
-
http://wiki.hping.org
-
http://wiley.com
-
http://www.activecountermeasures.com/simulating-a-beacon
-
http://www.anomali.com/community/staxx
-
http://www.archives.gov/files/records-mgmt/grs/grs03-2.pdf
-
http://www.beyondtrust.com/resources/glossary/privileged-
-
http://www.beyondtrust.com/resources/glossary/privileged-access-management-pam
-
http://www.bgp4.as/looking-
-
http://www.bgp4.as/looking-glasses
-
http://www.cfreds.nist.gov
-
http://www.cfreds.nist.gov/dfrws/DFRWS2005-
-
http://www.cftt.nist.gov/hardware_write_block.htm
-
http://www.cisa.gov/ais
-
http://www.cisa.gov/ais,
-
http://www.cisa.gov/information-
-
http://www.cisa.gov/information-sharing-and-analysis-organizations-isaos
-
http://www.cisa.gov/uscert
-
http://www.cisa.gov/uscert/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-
-
http://www.cisa.gov/uscert/sites/default/files/c3vp/crr_resources_guides/CRR_Resource_Guide-IM.pdf
-
http://www.cisco.com/c/en/us/about/security-
-
http://www.cisco.com/c/en/us/about/security-center/identify-incidents-via-syslog.html
-
http://www.cisecurity.org/benchmark
-
http://www.cisecurity.org/benchmark/microsoft_windows_desktop
-
http://www.cisecurity.org/benchmark/microsoft_windows_desktopand
-
http://www.cisecurity.org/benchmarkWhile
-
http://www.cisecurity.org/cis-
-
http://www.cisecurity.org/cis-benchmarks
-
http://www.cloudflare.com/learning/ddos/dns-
-
http://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack
-
http://www.cloudflare.com/learning/dns/dns-
-
http://www.cloudflare.com/learning/dns/dns-fast-flux
-
http://www.comptia.org/certifications/cybersecurity-analyst
-
http://www.comptia.org/continuing-
-
http://www.comptia.org/continuing-education
-
http://www.comptia.org/continuing-education/choose/renew-with-a-single-activity/earn-a-higher-level-comptia-certification
-
http://www.comptia.org/testing/testing-
-
http://www.copyright.com
-
http://www.cpni.gov.uk
-
http://www.cscprotectsbrands.com
-
http://www.cyber.gov.au
-
http://www.dc3.mil
-
http://www.dhs.gov/cisa/critical-infrastructure-sectors
-
http://www.dmarcanalyzer.com/spf
-
http://www.docker.com
-
http://www.first.org/cvss/specification-
-
http://www.first.org/cvss/specification-document
-
http://www.honeynet.org/projects
-
http://www.icann.org
-
http://www.isecom.org/research.html
-
http://www.joesandbox.com
-
http://www.kali.org/downloads
-
http://www.kali.org/downloads,
-
http://www.kali.org/get-
-
http://www.kali.org/get-kali
-
http://www.linkedin.com/pulse/i-
-
http://www.linkedin.com/pulse/i-purchased-domain-googlecom-via-google-domains-sanmay-ved
-
http://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/Gaining_the_Advantage_Cyber_Kill_Chain.pdf
-
http://www.macvendorlookup.com
-
http://www.macvendors.com
-
http://www.microsoft.com/en-
-
http://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction
-
http://www.microsoft.com/security/blog/tag/threat-
-
http://www.microsoft.com/security/blog/tag/threat-intelligence
-
http://www.misp-project.org/feeds
-
http://www.mycompany.com/app.php?include=C:
-
http://www.mycompany.com/app.php?include=C:\\www\\uploads\\attack.exe
-
http://www.mycompany.com/app.php?include=http://evil.attacker.com/attack.exe
-
http://www.mycompany.com/app.php?include=http://evil.attacker.com/attack.exeWhen
-
http://www.mycompany.com/sortusers.php?file=C:
-
http://www.mycompany.com/sortusers.php?file=C:\uploads\attack.exe
-
http://www.myserver.com/policy?document='../payroll/mike.pdf'FIGURE
-
http://www.myserver.com/policy?document='aup.pdf'The
-
http://www.nationalisacs.org
-
http://www.nist.gov/itl/ssd/software-
-
http://www.nist.gov/itl/ssd/software-quality-group/national-software-reference-library-nsrl
-
http://www.offensive-security.com/metasploit-unleashed
-
http://www.ossec.net
-
http://www.owasp.org/index.php/Static_Code_Analysis
-
http://www.pentest-standard.org/index.php/Main_Page
-
http://www.pwc.com/us/en/services/consulting/cybersecurity-
-
http://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/cyber-breach-reporting-legislation.html
-
http://www.regular-expressions.info/quickstart.html
-
http://www.senki.org/operators-
-
http://www.senki.org/operators-security-toolkit/open-source-threat-intelligence-feeds
-
http://www.sharedassessments.org
-
http://www.spamhaus.org
-
http://www.sybex.com
-
http://www.tenable.com/downloads/nessus
-
http://www.tenable.com/products/nessus/
-
http://www.tenable.com/products/nessus/nessus-essentials
-
http://www.unifiedkillchain.com/assets/The-
-
http://www.unifiedkillchain.com/assets/The-Unified-Kill-Chain.pdf
-
http://www.verizon.com/business/resources/reports/dbir
-
http://www.verizon.com/business/resources/reports/dbir.Server
-
http://www.virtualbox.org/wiki/
-
http://www.virtualbox.org/wiki/Downloads
-
http://www.virustotal.com
-
http://www.vmware.com/products/workstation-
-
http://www.vmware.com/products/workstation-player.html
-
http://www.whatismyip.com
-
http://www.whatismyip.com/email-
-
http://www.whatismyip.com/email-header-analyzer
-
http://www.whatismyip.com/email-header-analyzer/
-
http://www.wiley.com
-
http://www.wiley.com/go/eula
-
http://www.wiley.com/go/permission
-
http://www.wiley.com/go/permission.Trademarks:
-
http://www.wiley.com/go/sybextestprep
-
http://www.wiley.com/go/sybextestprep.
-
http://www.wiley.com/go/sybextestprep.5.
-
http://www.wired.com/images_
-
http://www.wired.com/images_blogs/threatlevel/2012/03/celiginvestigation.pdf
-
http://www.youtube.com/watch?v=pbPJIgdR3-
-
http://www.youtube.com/watch?v=pbPJIgdR3-8
-
http://xsoar.pan.dev/docs/reference/playbooks/playbook3
-
http://zeltser.com/lookup-
-
http://zeltser.com/lookup-malicious-websites
-
http://zonetransfer.me
-
https://apps.dtic.mil/sti/pdfs/ADA586960.pdf
-
https://apps.dtic.mil/sti/pdfs/ADA586960.pdf.
-
https://azure.microsoft.com/en-
-
https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-a-container/
-
https://blog.lastpass.com/2022/12/notice-of-recent-security-incident
-
https://blog.mailfence.com/email-
-
https://blog.mailfence.com/email-header
-
https://cfreds-archive.nist.gov/data_leakage_case/data-leakage-case.html
-
https://csrc.nist.gov/publications/detail/sp/800-
-
https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final
-
https://cybersecurity.att.com/open-
-
https://cybersecurity.att.com/open-threat-exchange
-
https://danielmiessler.com/study/tcpdump,
-
https://danielmiessler.com/study/tcpdump/
-
https://developer.vmware.com/web/tool/4.4.0/
-
https://developer.vmware.com/web/tool/4.4.0/ovf
-
https://dmarc.org/overview
-
https://dnschecker.org/email-header-analyzer.php
-
https://docs.metasploit.com
-
https://docs.tenable.com/Nessus.htm
-
https://forensics.wiki
-
https://github.com/elastic/examples/tree/master/Machine Learning/Security Analytics Recipes
-
https://github.com/elastic/examples/tree/master/Machine%20Learning/Security%20Analytics%20Recipes,
-
https://github.com/forensicswiki/wiki
-
https://github.com/forensicswiki/wiki.
-
https://hackertarget.com/tcpdump-examples
-
https://holidayhackchallenge.com/past-
-
https://holidayhackchallenge.com/past-challenges
-
https://home.pearsonvue.com/comptia
-
https://home.pearsonvue.com/comptiaOnce
-
https://information.rapid7.com/download-
-
https://information.rapid7.com/download-metasploitable-2017.html
-
https://isc.sans.org
-
https://itnext.io/linux-
-
https://itnext.io/linux-protecting-configuration-files-7b0e53b49a4
-
https://learn.microsoft
-
https://learn.microsoft.com/en-
-
https://learn.microsoft.com/en-us/lifecycle/products
-
https://learn.microsoft.com/en-us/windows-server/networking/windows-time-service/windows-time-service-tools-and-settings
-
https://live.sysinternals.com/toolname
-
https://nasbench.medium.com
-
https://nasbench.medium.com/windows-system-processes-an-overview-for-blue-teams-42fa7a617920
-
https://nmap.org/book/
-
https://nmap.org/book/osdetect-methods.html#osdetect-probes
-
https://nvd.nist.gov/vuln-
-
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
-
https://nvlpubs.nist.gov/nistpubs/
-
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf
-
https://oasis-open.github.io/cti-documentation
-
https://ocio.wa.gov/policy/electronic-
-
https://ocio.wa.gov/policy/electronic-signature-guidelines
-
https://otx.alienvault.com
-
https://owasp.org/www-
-
https://owasp.org/www-project-web-security-testing-guide/
-
https://research.domaintools.com/research/whois-
-
https://research.domaintools.com/research/whois-history
-
https://security.berkeley.edu/minimum-
-
https://security.berkeley.edu/minimum-security-standards-electronic-information
-
https://securityboulevard.com/2022/10/the-
-
https://securityboulevard.com/2022/10/the-defenders-guide-to-the-windows-registry
-
https://talosintelligence.com
-
https://talosintelligence.com/reputation_center
-
https://theautomationblog.com/converting-a-vmware-vmx-file-for-use-in-virtualbox/
-
https://threatconnect.com/resource/evilness-rating-skulls-scale-for-cyber-threats-4
-
https://threatfeeds.io
-
https://timetoolsltd.com/ntp/how-
-
https://timetoolsltd.com/ntp/how-to-install-and-configure-ntp-on-linux
-
https://tools.cisco.com/security/center/home.x
-
https://tools.cisco.com/security/center/home.x,
-
https://update.anomali.com/staxx/docs/Anomali_STAXX_Installation_
-
https://update.anomali.com/staxx/docs/Anomali_STAXX_Installation_&_Administration_Guide.pdf
-
https://usa.visa.com/dam/VCOM/download/merchants/
-
https://usa.visa.com/dam/VCOM/download/merchants/cisp-what-to-do-if-compromised.pdf
-
https://virusshare.com
-
https://wiki.postgresql.org/wiki/Monitoring
-
https://www.comptia.org/testing/testing-options/take-online-exam
-
https://www.honeynet.org/projects/
-
https://www.isecom.org/OSSTMM.3.pdf
-
https://www.ossec.net/ossec-downloads
-
https://www.torproject.org/download/
- Show all
-
-
9781394182923.jpg.jpg
Password: testing