|
|
|
@ -1,6 +1,6 @@
|
|
|
|
|
#### General |
|
|
|
|
|
|
|
|
|
##### Ask the students for explain how the ransomware work and the impact of it. |
|
|
|
|
##### Ask the students to explain how the ransomware work and the impact of it. |
|
|
|
|
|
|
|
|
|
###### Is the student able to explain clearly what ransomware means? |
|
|
|
|
|
|
|
|
@ -20,11 +20,11 @@ Files that must be inside your repository:
|
|
|
|
|
|
|
|
|
|
###### Are the required files present? |
|
|
|
|
|
|
|
|
|
##### Create an official Windows virtual machine and scan the student ransomware in windows defender. |
|
|
|
|
##### Create an official Windows virtual machine and scan the student's ransomware in windows defender. |
|
|
|
|
|
|
|
|
|
###### Does the program bypass the windows defender without any detection? |
|
|
|
|
|
|
|
|
|
##### Scan the student ransomware in [virustotal](https://www.virustotal.com/). |
|
|
|
|
##### Scan the student's ransomware in [virustotal](https://www.virustotal.com/). |
|
|
|
|
|
|
|
|
|
###### Does the program bypass more than 80% of Security vendors in [virustotal](https://www.virustotal.com/)? |
|
|
|
|
|
|
|
|
@ -36,7 +36,7 @@ Files that must be inside your repository:
|
|
|
|
|
|
|
|
|
|
###### Imagine that they are your files and try to decrypt them without the help of the student. |
|
|
|
|
|
|
|
|
|
###### There are no way to decrypt the files? |
|
|
|
|
###### Is there no way to decrypt the files? |
|
|
|
|
|
|
|
|
|
##### Ask the student to create a decryption program by using the encryption code. Run the decryption program. |
|
|
|
|
|
|
|
|
|