From 8585bc2a7191b259cd92fb28c589899a7d84464f Mon Sep 17 00:00:00 2001 From: nprimo Date: Tue, 20 Dec 2022 13:03:14 +0100 Subject: [PATCH] docs(malware): improve audit format --- .../cybersecurity/malware/audit/README.md | 24 ++++++++----------- 1 file changed, 10 insertions(+), 14 deletions(-) diff --git a/subjects/cybersecurity/malware/audit/README.md b/subjects/cybersecurity/malware/audit/README.md index 0287ab92..3ec05369 100644 --- a/subjects/cybersecurity/malware/audit/README.md +++ b/subjects/cybersecurity/malware/audit/README.md @@ -1,7 +1,6 @@ #### General -Knowledge-Check: -Ask the students for explain how the ransomware work and the impact of it. +##### Ask the students for explain how the ransomware work and the impact of it. ###### Is the student able to explain clearly what ransomware means? @@ -16,34 +15,31 @@ Ask the students for explain how the ransomware work and the impact of it. Files that must be inside your repository: - Your program source code. -- a README.md file, Which clearly explains how to use the program. -###### Does the required files present? +- a README.md file, Which clearly explains how to use the program. -##### Evaluate the student's submission +###### Are the required files present? -Create an official Windows virtual machine. -Scan the student ransomware in windows defender. +##### Create an official Windows virtual machine and scan the student ransomware in windows defender. ###### Does the program bypass the windows defender without any detection? -Scan the student ransomware in [virustotal](https://www.virustotal.com/). +##### Scan the student ransomware in [virustotal](https://www.virustotal.com/). ###### Does the program bypass more than 80% of Security vendors in [virustotal](https://www.virustotal.com/)? -Create some files with random data in the machine and run the program. +##### Create some files with random data in the machine and run the program. ###### Does the program change all files in the machine with the student extension(encrypt)? ###### Does the program add a text file with contact info and the encryption code (to recover the data)? -Imagine that they are your files and try to decrypt them without the help of the student. +###### Imagine that they are your files and try to decrypt them without the help of the student. -###### They are no way to decrtpy the files? +###### There are no way to decrypt the files? -Ask the student to create a decryption program by using the encryption code. -Run the decryption program. +##### Ask the student to create a decryption program by using the encryption code. Run the decryption program. ###### Do the files restore with their data? -###### Does the decryption program is usage unique for each victim? +###### Is the decryption program usage unique for each victim?