mirror of https://github.com/01-edu/public.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
50 lines
1.6 KiB
50 lines
1.6 KiB
2 years ago
|
#### General
|
||
|
|
||
|
Knowledge-Check:
|
||
|
Ask the students for explain how the ransomware work and the impact of it.
|
||
|
|
||
|
###### Is the student able to explain clearly what ransomware means?
|
||
|
|
||
|
###### Is the student able to explain clearly how he can bypass the Anti-Viruses?
|
||
|
|
||
|
###### Is the student able to explain clearly how his ransomware works?
|
||
|
|
||
|
###### Is the student able to explain clearly how his decrypting program works?
|
||
|
|
||
|
##### Check the Repo content
|
||
|
|
||
|
Files that must be inside your repository:
|
||
|
|
||
|
- Your program source code.
|
||
|
- a README.md file, Which clearly explains how to use the program.
|
||
|
|
||
|
###### Does the required files present?
|
||
|
|
||
|
##### Evaluate the student's submission
|
||
|
|
||
|
Create an official Windows virtual machine.
|
||
|
Scan the student ransomware in windows defender.
|
||
|
|
||
|
###### Does the program bypass the windows defender without any detection?
|
||
|
|
||
|
Scan the student ransomware in [virustotal](https://www.virustotal.com/).
|
||
|
|
||
|
###### Does the program bypass more than 80% of Security vendors in [virustotal](https://www.virustotal.com/)?
|
||
|
|
||
|
Create some files with random data in the machine and run the program.
|
||
|
|
||
|
###### Does the program change all files in the machine with the student extension(encrypt)?
|
||
|
|
||
|
###### Does the program add a text file with contact info and the encryption code (to recover the data)?
|
||
|
|
||
|
Imagine that they are your files and try to decrypt them without the help of the student.
|
||
|
|
||
|
###### They are no way to decrtpy the files?
|
||
|
|
||
|
Ask the student to create a decryption program by using the encryption code.
|
||
|
Run the decryption program.
|
||
|
|
||
|
###### Do the files restore with their data?
|
||
|
|
||
|
###### Does the decryption program is usage unique for each victim?
|