- 24:16 Chapter 4: Dissecting FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals
- 36:40 Chapter 3: RIG Exploit Kit Chain Internals - VBScript “CVE-2018-8174” & Flash “CVE-2018-4878” Exploit
- 1:03:35 Chapter 2: Understanding Common Malware Injection Techniques
- 17:35 Chapter 1: Recognizing Encryption Algorithms in Malware: RC4
Read the Zero2Hero Course Posts
FIN6 “FrameworkPOS”: Point-of-Sale Malware Analysis & Internals
The Zero2Hero malware course continues with Vitali Kremez diving into FIN6 “FrameworkPOS”, targeting payment card data from Point-of-Sale (POS) or eCommerce systemsREAD MORE
RIG Exploit Kit Chain Internals
The Zero2Hero malware course continues with Vitali Kremez explaining the RIG Exploit Kit and how it led to the Amadey Stealer and Clipboard HijackerREAD MORE
Gootkit Banking Trojan | Part 3: Retrieving the Final Payload
Gootkit’s final payload contains multiple Node.js scripts. Join Daniel Bunce as he reverse engineers the malware to take a deeper look at what it delivers.READ MORE
Powerful, Autonomous Endpoint Protection
SentinelOne saves you time by using multiple AI engines, providing complete visibility into all activity, and even rolling back threats with a single agent.
Do you want better protection?
Hey, We're SentinelOne. We are determined to protect enterprises from cyber threats. Our only question is, will it be yours?
Copyright © 2019 SentinelOne. All Rights Reserved.