The video demonstrates the static, dynamic and memory analysis of Linux malware Tsunami using Limon Sandbox.
Limon download Link: https://github.com/monnappa22/Limon
Analyzing Linux Malwares Using Limon
Setting up and Configuring Limon
Black Hat 2015 Europe presentation (Automating Linux Malware Analysis Using Limon Sandbox)
Black Hat Asia
While ransomware isn’t new, many users still find themselves victimized by it without knowing how their device got infected. They could have downloaded ransomware unknowingly by visiting malicious or compromised websites, or it could have been dropped or downloaded into their systems by other malware. Paying the ransom however, does not guarantee that users will regain access to their digital assets. Ransomware started gaining popularity years ago, and has cashed in on unknow
There are many different classes of malware that have varying ways of infecting systems and propagating themselves. Malware can infect systems by being bundled with other programs or attached as macros to files. Others are installed by exploiting a known vulnerability in an operating system (OS), network device, or other software, such as a hole in a browser that only requires users to visit a website to infect their computers. The vast majority, however, are installed by som
A security researcher walked through some of the methods used by Flashback malware to highlight the different types of Java vulnerabilities developers are exploiting. What exactly is Flashback?
Flashback is a form of malware designed to grab passwords and other information from users through their Web browser and other applications such as Skype. A user typically mistakes it for a legitimate browser plug-in while visiting a malicious Web site. At that point, the software inst
Windows XP Home SP1 (Due to lack of exploit updates on my system for win 7)
Beast v2.07 Trojan Horse
7-Zip A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not otherwise be allowed (for example, to an unauthorized user) while at the same time masking its existence or the existence of other software. The term rootkit is a co