mirror of https://github.com/01-edu/public.git
chore: run prettier
This commit is contained in:
parent
da7c356fb0
commit
773c3ad925
|
@ -1,6 +1,6 @@
|
|||
# Evasion
|
||||
|
||||
### Objective
|
||||
### Objective
|
||||
|
||||
The goal of this project is to understand the methods of hackers who bypass anti-viruses, so also to understand how antivirus works in a little more advanced way than mal-track.
|
||||
|
||||
|
@ -10,18 +10,21 @@ You will need to develop a windows program
|
|||
The windows program will have to give us the possibility to encrypt another program
|
||||
Increase its size by 101mb
|
||||
Add an increment of an int to 100001
|
||||
Look at the time, do a sleep of 101 seconds, look at the time to check that 101 seconds has passed, if the 101 seconds have not elapsed, do not decrypt the binary and do not execute it
|
||||
Look at the time, do a sleep of 101 seconds, look at the time to check that 101 seconds has passed, if the 101 seconds have not elapsed, do not decrypt the binary and do not execute it
|
||||
|
||||
This project is carried out on a virtual machine (in your malware analysis lab).
|
||||
You are free to choose your virtual machine, it must be windows-based. (but in the audit you will use an official windows virtual machine!)
|
||||
You are free to choose the programming language for your program.
|
||||
|
||||
### Advice
|
||||
https://wikileaks.org/ciav7p1/cms/files/BypassAVDynamics.pdf
|
||||
|
||||
https://wikileaks.org/ciav7p1/cms/files/BypassAVDynamics.pdf
|
||||
https://0x00sec.org/c/cryptology/
|
||||
|
||||
### Submission and audit
|
||||
Files that must be inside your repository:
|
||||
|
||||
Files that must be inside your repository:
|
||||
|
||||
- Your program source code.
|
||||
- a README.md file, Which clearly explains how to use the program.
|
||||
|
||||
|
|
|
@ -1,26 +1,27 @@
|
|||
# Mal Track
|
||||
|
||||
"Even the lion has to defend himself against flies"
|
||||
### Objective
|
||||
|
||||
### Objective
|
||||
|
||||
The goal of this project is to understand the basic operation of a computer virus on a Windows environment and simple methods to eradicate them.
|
||||
|
||||
### Guidelines
|
||||
|
||||
The purpose of this project is to create a program that will kill the [malware](./resources/mal-track(Fynloski%20sample%2C%20ON%20VM%20ONLY).zip), remove its execution from the startup of the machine, stops and removes it from the virtual machine and display the ip address of the attacker.
|
||||
The purpose of this project is to create a program that will kill the [malware](<./resources/mal-track(Fynloski%20sample%2C%20ON%20VM%20ONLY).zip>), remove its execution from the startup of the machine, stops and removes it from the virtual machine and display the ip address of the attacker.
|
||||
|
||||
This project is carried out on a virtual machine (in your malware analysis lab).
|
||||
You are free to choose your virtual machine, it must be windows-based. (but in the audit you will use an official windows virtual machine!)
|
||||
You are free to choose the programming language for your program.
|
||||
|
||||
|
||||
|
||||
### Advice
|
||||
|
||||
https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Win32%2fFynloski
|
||||
|
||||
|
||||
### Submission and audit
|
||||
Files that must be inside your repository:
|
||||
|
||||
Files that must be inside your repository:
|
||||
|
||||
- Your program source code.
|
||||
- a README.md file, Which clearly explains how to use the program.
|
||||
|
||||
|
|
Loading…
Reference in New Issue