Monthly Archives: July 2023
12. Executable Wrappers So the next thing we want to talk about are the various ways of getting somebody infected by a Trojan component. So I’m just going to create a little scenario here. The scenario I’m going to create is that the Remote Access Trojan comes naturally as a server. That’s the malicious code […]
8. Malware Capabilities Now, the next thing we want to talk about is malware capabilities and some of the things that malware might do. If it’s installed on your system, whether it’s known to you or perhaps not known to you, naturally it can give remote access to someone that you don’t even know that […]
5. Defining Malware: Spyware Now we get into more of a controversial type of malware known as spyware. And spyware actually appeared back in the late 1990s when several researchers, one that I can recall is Steve Gibson that actually looked at information being passed back to vendors. And he got to looking into it […]
1. Introduction to Malware and How The Internet Makes Money In this section we’ll talk about malware. We’ll start off by how the actual internet makes its money. We’ll define malware, Trojans and backdoors. We’ll define things like viruses and worms as well as spyware, loss prevention and other types of creepy things. We’ll discuss […]
23. RootKits – Frightening Demo Okay, so here we are back at our XP Attacker Machine. And the reason I’m using XP is because the root kit that I want to demonstrate for you, which is one of the very few GUI based rootkits only works with XP Service Pack One and below. And so, […]
21. Virtually Complete Secrecy, TOR Okay, we finished up talking about something referred to as anonymity. Now we’re going to talk about something referred to as anonymous and secure. And the utility I’m talking about is called Tor. Now, Tor stands for the onion router because it has many different layers. As a matter of […]
19. Anonymizers – JAP Okay guys, the next thing we’re going to talk about is a free tool called Jap that gives us Internet anonymity. It does not offer any encryption and I’m going to go ahead and move right into the demo on this. Now while we’re right here and available, I want to […]
17. Alternate Data Streams Demonstration – B Let’s try how about notepad? And I’m going to start this with a colon, and I’m just saying U-D-E-M-Y um txt. Okay. And I’m going to put in a whole bunch of junk in here, all right? And I’m going to go ahead and save it, get out […]
13. Demonstration MimiKatz Now guys, if nothing I have shown you has scared you yet, this will definitely scare you if you’re not familiar with it. Microsoft in Vista and above attempted to create a single sign on in its Windows Seven and above operating system. We know that the LSAS, the Local System Authority, […]
9. Countermeasures: Stealing the Passwords, Syskey, Salting Now there are just a couple more things that I wanted to reiterate before we moved on out of the password cracking. And I probably should mention the password cracking that is offline in nature. I’m hoping you put two and two together at this point where the […]