Description: In this video you will learn how to Analysis the Malicious contents. Now days we are visiting on lots of sites so how we know that this site is safe for browsing. So here are the steps that you need to follow if you want to check behavior of a web browser for malicious contents.
Video Author using two tools called Thug and Cuckoo both tools are very powerful for Malware and Malicious Contents analysis.
Thug : - Thug is a Python low-interaction honeyclient aimed at mimicing the behavior of a web browser in order to detect and emulate malicious contents.
https://github.com/buffer/thug
Cuckoo : - Cuckoo is a very powerful tool for Malware analysis and using Cuckoo you can generates a handful of differences raw data like - Native functions and Windows API calls traces, Dump of the memory of the selected process, Network dump generated by the machine used for the analysis etc..
More Information About This tool Visit : - http://www.cuckoosandbox.org/
And for Demo : - http://vimeo.com/46142340
Tags: hacking , hack , malware , anaylsis ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.