Audit

Découvrez des tools de sécurité informatique et leurs actualités

En cette page, je vous propose des tools et logiciels en but d’analysé la sécurité de votre site web

Des tools pour visualisé des attaques DDOS, localisé les ip, analysé les failles de votre cms, voici ce que nous vous offrons dans cette page . Vous souhaitez en savoir plus sur notre blog et articles de presse, c’est par ici .

Les sites et outils

 BOTNET TRACKER via le site : https://intel.malwaretech.com/

Le Blog MalwareTech

  • Tracking the Hide and Seek Botnet

    Hide and Seek (HNS) is a malicious worm which mainly infects Linux based IoT devices and routers. The malware spreads via bruteforcing SSH/Telnet credentials, as well as some old CVEs. What makes HNS unique is there’s no command and control […]

  • Best Languages to Learn for Malware Analysis

    One of the most common questions I’m asked is “what programming language(s) should I learn to get into malware analysis/reverse engineering”, to answer this question I’m going to write about the top 3 languages which […]

  • Investigating Command and Control Infrastructure (Emotet)

    Although the majority of botnets still use a basic client-server model, with most relying on HTTP servers to receive commands, many prominent threats now use more advanced infrastructure to evade endpoint blacklisting and be resilient to take-down. […]

  • Creating a Simple Free Malware Analysis Environment

    Computer Requirements: A CPU with AMD-V or Intel VT-x support (pretty much any modern CPU). 4 GB RAM (more is better). Make sure Virtualization (AMD-V or Intel VT-x) is enabled in the BIOS. To do this, you’ll need to google “enable […]

  • Petya Ransomware Attack – What’s Known

    Petya The jury is still out on whether the malware is Petya or something that just looks like it (it messes with the Master Boot Record in a way which is very similar to Petya and not commonly used in other ransomware). Hasherzade who is a […]

 

Le site CyberWire

The CyberWire More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.