1 00:00:00,460 --> 00:00:08,110 Hello and welcome to my costs and tighter fundamentals of malware, analysis of malicious documents. 2 00:00:08,620 --> 00:00:12,340 My name is Paul Chin and I'm the instructor for this course. 3 00:00:13,000 --> 00:00:19,480 Did you know that you could infect your computer just by opening a PDA or office document? 4 00:00:20,320 --> 00:00:27,610 PDAF and office documents are commonly used as the first stage of malware attack in the second stage. 5 00:00:27,970 --> 00:00:35,280 The embedded scripts in the document itself may download malicious binaries like ransomware or remote 6 00:00:35,290 --> 00:00:37,580 access tools to compromised your system. 7 00:00:38,380 --> 00:00:45,940 Everyone uses documents, so you need to be aware of the dangers and how to detect malicious documents 8 00:00:46,480 --> 00:00:47,650 learning objectives. 9 00:00:47,890 --> 00:00:55,960 In this course, I will show you how to examine BDF Head Microsoft Office documents, what tools to 10 00:00:55,960 --> 00:00:59,680 use and techniques of how to analyze them. 11 00:01:00,610 --> 00:01:07,360 By the end of this course, you will know how to determine if a document is malicious and what it does 12 00:01:07,360 --> 00:01:12,610 to compromise some so that you can protect your network eg organization. 13 00:01:14,080 --> 00:01:21,290 What you will learn in this course, you will learn to install remnants of Linux virtual machine, identify 14 00:01:21,290 --> 00:01:25,930 PDF, identify Microsoft Office documents and their versions. 15 00:01:26,380 --> 00:01:28,690 A strict document metadata. 16 00:01:29,380 --> 00:01:39,220 Basic Linux commands Melbourne analysis a extract bad objects in JavaScript from PDA extract VBA macros 17 00:01:39,220 --> 00:01:40,890 scripts from office documents. 18 00:01:42,760 --> 00:01:48,400 JavaScript and Web based groups automate analyses of documents. 19 00:01:49,070 --> 00:01:57,680 View and give up America's office mako's identifying Mikac origin of intelligence documents used Usera 20 00:01:57,800 --> 00:02:00,590 to identify malicious patterns and signatures. 21 00:02:01,240 --> 00:02:09,700 Analise OpenOffice XML format documents, as well as structured storage format documents, analyze powers, 22 00:02:09,710 --> 00:02:18,820 show scripts, websites need to know the artifacts and indicators of compromise and more prerequisites 23 00:02:19,210 --> 00:02:20,380 you need to get moving. 24 00:02:20,380 --> 00:02:23,750 NBC and interests in revitalizes. 25 00:02:24,490 --> 00:02:29,150 Some basic Linux knowledge will be helpful, but not strictly necessary. 26 00:02:29,920 --> 00:02:38,940 Hoodie's costs for anyone who has no background, no analysis, and just starting up this few hobbies, 27 00:02:39,450 --> 00:02:42,540 we just like to learn how to analyze militias. 28 00:02:42,590 --> 00:02:42,700 The. 29 00:02:43,970 --> 00:02:51,800 Students who like to get started on a career path to become bell ringers, anyone eager to learn how 30 00:02:51,800 --> 00:02:53,910 to detect malicious documents. 31 00:02:54,380 --> 00:03:03,050 Some of the tools that will be learned in this course are believed by the taxi to be deposited BBVA 32 00:03:03,050 --> 00:03:13,680 Spider Monkey Yota or a who at times will be a viper monkey, lazy officinalis and more. 33 00:03:14,500 --> 00:03:21,780 My background by profession, I was a coalition lecturer and I had been teaching computer science in 34 00:03:21,820 --> 00:03:24,130 Nike for more than 10 years. 35 00:03:24,700 --> 00:03:25,840 Thank you for watching. 36 00:03:26,140 --> 00:03:27,420 I'll see you inside.