CATEGORY: Malware Analysis
9.4 – Malware Setup, FUD and Avoidance (Part 2)
Setup Port forwarding (on Attacker’s system) After delivering Trojan to your victim, you only need to do one more thing on your system – enable port forwarding on your router. This is necessary and the most important part of the process. Now, how can you enable port forwarding on your system? Well, you only […]
9.3 – Malware Setup, FUD and Avoidance (Part 1)
There are two types of Trojan attacks used by attackers to control their victims: local connection and remote connection. In local connection, an attacker performs Trojan attack only in a LAN (Local Area Network) and is able to control any system within that network. To do this, he needs to somehow install Trojan client software […]
9.2 – Methods of Malware Analysis
In this section, let us examine some of the methods which are used in malware analysis. Detecting Packed/Obfuscated: Packed or unpacked malware is malware that has been altered during a runtime compression, so that the malware will become tougher to be acknowledged by antivirus, making it tougher for malware researchers to carry out malware analysis. […]
9.1 – Malware Analysis – Goals and Types
Malware analysis is vital to understand malware actions. It helps firms understand existing exposure to malware by providing crime-ware analysis especially after incidence. There are too many alternatives on how attackers operate, using too many actions to hide their nefarious goals. McAfee estimates more than 8 million new alternatives. In analysis, the instant goal is to enclose […]
9.0 – Malware – Variants, Infections and Effects
The following are some of the major variants of malware: Virus: A virus is a program that reproduces its own code by attaching itself to other executable files in such a way that the virus code is executed automatically when an infected executable file is executed. A virus reproduces usually without your permission or knowledge. […]






