Incident Response Training, How to Remove Malware – Day 19, Automate Linux Analysis

Incident Response Training, How to Remove Malware – Day 19, Automate Linux Analysis

HomeBlackPerlIncident Response Training, How to Remove Malware – Day 19, Automate Linux Analysis
Incident Response Training, How to Remove Malware – Day 19, Automate Linux Analysis
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
In this comprehensive series, we will talk about incident response and it will be a free training course for everyone. Today is day 19 and we will explore the easiest way to remove malware from your website.
Hackers often use malware to attack legitimate websites. They prefer to attack websites that are not well protected because they can infect them more easily. Websites can be infected in a variety of ways. They use phishing, fraudulent websites, backdoors, source code modifications, disguised plugins and drive-by downloads to spread malware.
Malicious software (malware) is installed on a website when it is hacked, either by modifying existing files or folders or by adding new files. Malware is software designed to harm your website and is difficult to detect. Figuring out if a piece of code is malware that needs to be removed can be difficult if you don't know what website code looks like. Since every hack is unique, all you need to do is go through your website's files and figure out what doesn't belong there.
So today we’re going to explore all the steps you need to know for your incident response job and even your SOC interview.

As a bonus, you can now also download and use the Power Forensics tool, which will be useful for analyzing and collecting data for all Linux machines.

LINKS for your requirements-
—————————————————————————————————————
1. Power Forensics – https://github.com/archanchoudhury/Power-Forensics

CHECK OUT THE PLAYLIST BELOW if you are interested in pursuing a career in DFIR and Security Operations!!
—————————————————————————————————————
INCIDENT RESPONSE TRAINING – Full Course https://youtube.com/playlist?list=PLjWEV7pmvSa4yvhzNsCjOJovOn1LLyBXB
Free DFIR tools and techniques https://youtube.com/playlist?list=PLjWEV7pmvSa6f-NTpXsaUYWZLjLAB_0TS
Windows and Memory Forensics https://youtube.com/playlist?list=PLjWEV7pmvSa50erciZUSnzvE7nK0FyvsH
Malware Analysis https://youtube.com/playlist?list=PLjWEV7pmvSa6u32RongesgDtkfKBfrFWW
SIEM tutorial https://youtube.com/playlist?list=PLjWEV7pmvSa7cXTkCppnYHERUdy8Dd71x
Threat Hunting and Threat Intelligence https://youtube.com/playlist?list=PLjWEV7pmvSa5UTZlsWp5wRnURNbeMS-fu

Timelines
—————————————————————————————————————
0:00 ⏩ Introduction
1:20 ⏩ How websites get infected
8:45 ⏩ How to find out if you are infected
13:04 ⏩ Scan your content
14:30 ⏩ Clean up your content
19:51 ⏩ Manual malware removal
27:27 ⏩ Useful commands
28:15 ⏩ Energy forensics
33:56 ⏩ Summarize

FOLLOW ME EVERYWHERE-
—————————————————————————————————————
LinkedIn: https://www.linkedin.com/company/blackperl
You can also reach me personally via LinkedIn: https://bit.ly/38ze4L5
Twitter: @blackperl_dfir
Git: https://github.com/archanchoudhury
Insta: (blackperl_dfir)https://www.instagram.com/blackperl_dfir/
Reachable via [email protected]

SUPPORT FOR BLACKPERL
—————————————————————————————————————-
╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗
║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣
╠╗║╚╝║║╠╗║╚╣║║║║║═╣
╚═╩══╩═╩═╩═╩╝╚╩═╩═╝
️ SUBSCRIBE, Share, Like, Comment
Buy me a coffee https://www.buymeacoffee.com/BlackPerl
Sponsorship inquiries: [email protected]

—————————————————————————————————————-
Thanks for watching! Be cyber aware!

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.