From 773c3ad925f0b37371272ce328ed1e04161e625c Mon Sep 17 00:00:00 2001 From: nprimo Date: Mon, 31 Jul 2023 17:30:51 +0100 Subject: [PATCH] chore: run prettier --- subjects/cybersecurity/evasion/README.md | 11 +++++++---- subjects/cybersecurity/mal-track/README.md | 13 +++++++------ 2 files changed, 14 insertions(+), 10 deletions(-) diff --git a/subjects/cybersecurity/evasion/README.md b/subjects/cybersecurity/evasion/README.md index 293caa1b..d77c7e42 100644 --- a/subjects/cybersecurity/evasion/README.md +++ b/subjects/cybersecurity/evasion/README.md @@ -1,6 +1,6 @@ # Evasion -### Objective +### Objective The goal of this project is to understand the methods of hackers who bypass anti-viruses, so also to understand how antivirus works in a little more advanced way than mal-track. @@ -10,18 +10,21 @@ You will need to develop a windows program The windows program will have to give us the possibility to encrypt another program Increase its size by 101mb Add an increment of an int to 100001 -Look at the time, do a sleep of 101 seconds, look at the time to check that 101 seconds has passed, if the 101 seconds have not elapsed, do not decrypt the binary and do not execute it +Look at the time, do a sleep of 101 seconds, look at the time to check that 101 seconds has passed, if the 101 seconds have not elapsed, do not decrypt the binary and do not execute it This project is carried out on a virtual machine (in your malware analysis lab). You are free to choose your virtual machine, it must be windows-based. (but in the audit you will use an official windows virtual machine!) You are free to choose the programming language for your program. ### Advice -https://wikileaks.org/ciav7p1/cms/files/BypassAVDynamics.pdf + +https://wikileaks.org/ciav7p1/cms/files/BypassAVDynamics.pdf https://0x00sec.org/c/cryptology/ ### Submission and audit -Files that must be inside your repository: + +Files that must be inside your repository: + - Your program source code. - a README.md file, Which clearly explains how to use the program. diff --git a/subjects/cybersecurity/mal-track/README.md b/subjects/cybersecurity/mal-track/README.md index e7ff4386..6de58dc6 100644 --- a/subjects/cybersecurity/mal-track/README.md +++ b/subjects/cybersecurity/mal-track/README.md @@ -1,26 +1,27 @@ # Mal Track "Even the lion has to defend himself against flies" -### Objective + +### Objective The goal of this project is to understand the basic operation of a computer virus on a Windows environment and simple methods to eradicate them. ### Guidelines -The purpose of this project is to create a program that will kill the [malware](./resources/mal-track(Fynloski%20sample%2C%20ON%20VM%20ONLY).zip), remove its execution from the startup of the machine, stops and removes it from the virtual machine and display the ip address of the attacker. +The purpose of this project is to create a program that will kill the [malware](<./resources/mal-track(Fynloski%20sample%2C%20ON%20VM%20ONLY).zip>), remove its execution from the startup of the machine, stops and removes it from the virtual machine and display the ip address of the attacker. This project is carried out on a virtual machine (in your malware analysis lab). You are free to choose your virtual machine, it must be windows-based. (but in the audit you will use an official windows virtual machine!) You are free to choose the programming language for your program. - - ### Advice -https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32%2fFynloski +https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32%2fFynloski ### Submission and audit -Files that must be inside your repository: + +Files that must be inside your repository: + - Your program source code. - a README.md file, Which clearly explains how to use the program.