27 août 2024
#############################
Video Source: www.youtube.com/watch?v=bwOyxEohUqM
Learn how to use Mandiant's FakeNet-NG network analysis tool to intercept c2 communications from the BlackNET malware in this malware analysis tutorial. • Support us on Youtube: / @guidedhacking • Support us on Patreon: / guidedhacking • Support us on our site: https://guidedhacking.com/register/ • BlackNET is a popular malware with many different features, it has an advanced C2 panel which can be used to leverage the bots to perform many tasks including stealing credentials and performing DDoS attacks. • GH BlackNET Malware Analysis Article: https://guidedhacking.com/threads/bla... • This quick and simple FakeNET-NG tutorial should get you up and running with this tool. • FakeNet-NG is a network tool for malware analysts. It's open source and works on Windows and certain functions work on Linux as well. FakeNet-NG is based on Fakenet which was developed by Michael Sikorski and Andrew Honig. • This tool allows you to intercept redirect traffic and simulate legitimate network traffic. Using FakeNet-NG, analysts can identify the malware's functions create network signatures. It's configurable interception engine and modular framework are very useful when testing application's and prototyping PoCs. You can find it here: https://github.com/mandiant/flare-fak... • Chapters: • 0:00 - Introduction • 0:50 - Analysis • Follow us on Twitter : http://bit.ly/3bC7J1i • Follow us on Reddit : http://bit.ly/3bvOB57 • Follow us on Instagram : http://bit.ly/2SoDOlu • Follow us on GitHub : http://bit.ly/2HoNXIS • Follow us on Twitch : http://bit.ly/39ywOZ2 • Follow us on Facebook : http://bit.ly/2vvHfhk • #malwareanalysis #malware #malwaresecuritygeeks
#############################