Browse Source

chore: run prettier

pull/2111/head
nprimo 10 months ago committed by Niccolò Primo
parent
commit
773c3ad925
  1. 11
      subjects/cybersecurity/evasion/README.md
  2. 13
      subjects/cybersecurity/mal-track/README.md

11
subjects/cybersecurity/evasion/README.md

@ -1,6 +1,6 @@
# Evasion
### Objective
### Objective
The goal of this project is to understand the methods of hackers who bypass anti-viruses, so also to understand how antivirus works in a little more advanced way than mal-track.
@ -10,18 +10,21 @@ You will need to develop a windows program
The windows program will have to give us the possibility to encrypt another program
Increase its size by 101mb
Add an increment of an int to 100001
Look at the time, do a sleep of 101 seconds, look at the time to check that 101 seconds has passed, if the 101 seconds have not elapsed, do not decrypt the binary and do not execute it
Look at the time, do a sleep of 101 seconds, look at the time to check that 101 seconds has passed, if the 101 seconds have not elapsed, do not decrypt the binary and do not execute it
This project is carried out on a virtual machine (in your malware analysis lab).
You are free to choose your virtual machine, it must be windows-based. (but in the audit you will use an official windows virtual machine!)
You are free to choose the programming language for your program.
### Advice
https://wikileaks.org/ciav7p1/cms/files/BypassAVDynamics.pdf
https://wikileaks.org/ciav7p1/cms/files/BypassAVDynamics.pdf
https://0x00sec.org/c/cryptology/
### Submission and audit
Files that must be inside your repository:
Files that must be inside your repository:
- Your program source code.
- a README.md file, Which clearly explains how to use the program.

13
subjects/cybersecurity/mal-track/README.md

@ -1,26 +1,27 @@
# Mal Track
"Even the lion has to defend himself against flies"
### Objective
### Objective
The goal of this project is to understand the basic operation of a computer virus on a Windows environment and simple methods to eradicate them.
### Guidelines
The purpose of this project is to create a program that will kill the [malware](./resources/mal-track(Fynloski%20sample%2C%20ON%20VM%20ONLY).zip), remove its execution from the startup of the machine, stops and removes it from the virtual machine and display the ip address of the attacker.
The purpose of this project is to create a program that will kill the [malware](<./resources/mal-track(Fynloski%20sample%2C%20ON%20VM%20ONLY).zip>), remove its execution from the startup of the machine, stops and removes it from the virtual machine and display the ip address of the attacker.
This project is carried out on a virtual machine (in your malware analysis lab).
You are free to choose your virtual machine, it must be windows-based. (but in the audit you will use an official windows virtual machine!)
You are free to choose the programming language for your program.
### Advice
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32%2fFynloski
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32%2fFynloski
### Submission and audit
Files that must be inside your repository:
Files that must be inside your repository:
- Your program source code.
- a README.md file, Which clearly explains how to use the program.

Loading…
Cancel
Save