Attempt the following exercise for gaining hands-on experience with network malware analysis:
- Complete all exercises on Emotet Banking Trojan from https://www.malware-traffic-analysis.net/training-exercises.html
- Complete challenge 10 and 11 from https://github.com/nipunjaswal/networkforensics/tree/master/Challenges?
- Can you decrypt a ransomware through PCAP? If yes, how and under what conditions?
- Most of the Command and Control servers have?
- Encryption
- Encoding
- Beaconing behavior
- None of the above
- All of the above
- Most of the banking Trojans gets installed on the system through?
- Phishing
- Malspam
- Exploits
- Human errors
- All of the above
- None of the above