This course covers the evolution and tactics of a specific malware, detailing its infection vectors, full cycle, possible explanations, and cleaning methods. Students will learn about the backdoor, output protocol manager, and monitoring techniques. The teaching method includes a mix of theoretical explanations and practical demonstrations. This course is intended for cybersecurity professionals interested in malware analysis and threat intelligence.
Overview
Syllabus
Introduction
Overview
The Snake
Four Main Steps
Infection vectors
Fake flashing star
Full infection cycle
Possible explanations
ISP compromise
Lateral movement
Cleaning
Output Backdoor
Outlook Output Protocol Manager
The Backdoor
Demo
Monitoring
Conclusion
Taught by
Cooper