![]() It is a good idea to look through the list of processes and kill off any that seem to have stalled and remove suspicious processes that you don’t recognize. Programs are not always written to deal with every eventuality and there can be processes still live, while effectively not doing anything. Processes sometimes hang because they are waiting for a resource that has been locked by another process. Some programs run one, while others are written to work continuously in a loop (daemons). It was a great way to get some hands-on experience from both MAPT and PMAT courses.Ī big shoutout and Thanks to Matt Kiely aka HuskyHacks and Aaron Wilson for those excellent courses.When a piece of software starts up, the operating system serving it creates a program to run the associated program. * Detection and report writing (YARA rules) ![]() * Automated Analysis (BlueJupyter, Any.run) * Hands on with different malware classes (WannaCry ransomware, Go backdoors, Android Malware, Excel maldocs, Obfuscated powershell scripts, HTA payloads, Shellcode) * Advanced Dynamic Analysis (x32dbg, Binary Patching, Debugging, Anti-analysis techniques) * Advanced Static Analysis (Assembly, Disassembling & Decompiling, Cutter) * Basic Dynamic Analysis (TCPView, Inetshim, Wireshark, Procmon) * Basic Static Analysis (PEStudio, MalAPI.io, Capa, hashing, FLOSS, PEView) Some of the areas covered by PMAT course include: MAPT demonstrate common techniques to extract sensitive data from Android and iOS Application such as stored secrets, firebase databases, API Keys etc. ![]() PMAT goes over the basic and advanced concepts and methodologies of analyzing malware in different forms both theoretical and practical. It's a delightful moment to share that I have completed in this month the Practical Malware Analysis & Triage (PMAT) and Mobile Application Penetration Testing (MAPT) courses by TCM Security. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |