Skill Level Intermediate
- [Thomas] Worms can infiltrate our systems through different methods, and one of the most common ones is email. Hi, I'm Thomas Pantels, and in this course we will use two tools from the Windows Performance Toolkit to analyze and inspect the source code of an email worm that can infect files and pass itself as an email attachment. We will see a worm that can evade anti-virus programs, and look at how to detect if one is running on your computer. After seeing the source code, we start analyzing the data in order to identify some key characteristics of the worm in order to find and remove it.
Are you ready? Let's get started.