To access material, start machines and answer questions login.
Analysing potentially malicious software can be daunting, especially when this is part of an ongoing security incident. This analysis puts much pressure on the analyst. Most of the time, the results must be as accurate as possible, and analysts use different tools, machines, and environments to achieve this. In this room, we will use the REMnux .
The REMnux is a specialised distro. It already includes tools like Volatility, YARA, Wireshark, oledump, and INetSim. It also provides a -like environment for dissecting potentially malicious software without risking your primary system. It's your lab set up and ready to go without the hassle of manual installations.
Learning Objectives
- Explore the tools inside the REMnux
- Learn how to use tools to analyse potentially malicious documents effectively
- Learn how to simulate a fake network to aid in the analysis
- Be familiar with the tools used to analyse memory images
Room Prerequisites
Familiarity with the CyberChef tool is recommended but not mandatory before starting the course. You can check the room associated with it.
Proceed with the next tasks to learn more!
Ready to learn Cyber Security?
The REMnux: Getting Started room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
