In this video you will learn how to Analysis a malware (Botnet) using IDApro tool in a Virtual Machine. In this video they will shows us a Scenario based case study which included the complete anaylsis process for malware consisting. This video is part of a sires made by of SecurityXploded.
Avast researchers have spotted a Linux rootkit that has the ability to hide malicious processes. The new Linux rootkit, called Syslogk, works by using magic packets to activate...
Read more