Audit

Découvrez des tools de sécurité informatique et leurs actualités

En cette page, je vous propose des tools et logiciels en but d’analysé la sécurité de votre site web

Des tools pour visualisé des attaques DDOS, localisé les ip, analysé les failles de votre cms, voici ce que nous vous offrons dans cette page . Vous souhaitez en savoir plus sur notre blog et articles de presse, c’est par ici .

Les sites et outils

 BOTNET TRACKER via le site : https://intel.malwaretech.com/

Le Blog MalwareTech

  • Best Languages to Learn for Malware Analysis

    One of the most common questions I’m asked is “what programming language(s) should I learn to get into malware analysis/reverse engineering”, to answer this question I’m going to write about the top 3 languages which […]

  • Investigating Command and Control Infrastructure (Emotet)

    Although the majority of botnets still use a basic client-server model, with most relying on HTTP servers to receive commands, many prominent threats now use more advanced infrastructure to evade endpoint blacklisting and be resilient to take-down. […]

  • Creating a Simple Free Malware Analysis Environment

    Computer Requirements: A CPU with AMD-V or Intel VT-x support (pretty much any modern CPU). 4 GB RAM (more is better). Make sure Virtualization (AMD-V or Intel VT-x) is enabled in the BIOS. To do this, you’ll need to google “enable […]

  • Petya Ransomware Attack – What’s Known

    Petya The jury is still out on whether the malware is Petya or something that just looks like it (it messes with the Master Boot Record in a way which is very similar to Petya and not commonly used in other ransomware). Hasherzade who is a […]

  • Note on WannaCrypt Infection Count Accuracy

    Our sinkhole is designed to collect any and all HTTP requests to sinkholed domain for investigation purposes (these are then sent to a back-end database). What this means is that around the period when infections started being prevented the […]

 

Le site CyberWire

The CyberWire More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.