From the course: Ethical Hacking: The Complete Malware Analysis Process
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Understanding advanced persistent threats
From the course: Ethical Hacking: The Complete Malware Analysis Process
Understanding advanced persistent threats
- [Instructor] A good source of information on APTs is Kaspersky Labs. Here we see the Kaspersky APT site. If we scroll down to the lower screen, we can see the various APTs. Let's have a look at Stuxnet. If we click on it, we get some basic facts. If we click on Go To The Threat, we can also see the other APTs which relate to it. Let's have a look at another called Lamberts and go to the threat. We can see this targets a much wider geographical area than Stuxnet. If we scroll down, we can see a link to more information. And this takes us to an analysis of the APT. Defending against APTs is difficult, and it's likely that an APT attack will succeed. APTs usually are found when network monitoring detects the installed malware attempting to connect to its command and control systems. Focusing controls which address each stage of the Cyber Kill Chain provides the opportunity for early detection. Nevertheless, the average time it takes to detect an APT is measured in months. Advanced…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Hiding malware5m 31s
-
(Locked)
Malware that changes its spots1m 49s
-
(Locked)
Polymorphic malware5m 37s
-
(Locked)
Using cryptography in ransomware5m 20s
-
(Locked)
Understanding advanced persistent threats1m 30s
-
(Locked)
Analyzing Win32.Sodin3m 50s
-
(Locked)
Analyzing black and grey energy7m 32s
-
(Locked)
Understanding log4shell4m 22s
-
(Locked)
-
-