Category: Malware Analysis

9.4 – Malware Setup, FUD and Avoidance (Part 2)

Setup Port forwarding (on Attacker’s system) After delivering Trojan to your victim, you only need to do one more thing on your system – enable port forwarding on your router. This is necessary and the most important part of the…
9.3 – Malware Setup, FUD and Avoidance (Part 1)

There are two types of Trojan attacks used by attackers to control their victims: local connection and remote connection. In local connection, an attacker performs Trojan attack only in a LAN (Local Area Network) and is able to control any…
9.2 – Methods of Malware Analysis

In this section, let us examine some of the methods which are used in malware analysis. Detecting Packed/Obfuscated: Packed or repacked malware is malware that has been altered during a runtime compression, so that the malware will become tougher to…
9.1 – Malware Analysis – Goals and Types

Malware analysis is vital to understand malware actions. It helps firms understand existing exposure to malware by providing crime-ware analysis especially after incidence. There are too many alternatives on how attackers operate, using too many actions to hide their nefarious…