Skip to main content

ESMA102 - Exploring Malware Functionalities


CyberWarrior

About This Course

The malware executes in a command shell, it begins by checking to see if the executing file contains the MZP file extension, and then continues to access the Windows Registry checking to see if a few local registry values exists. The malware will then try to search and display information regarding the executing host (such as a server) including but not limited to the password, port number, ICQ number, and E-mail address.

In this section, you will understand how malware makes use of various API functions to implement certain functionality.

Requirements

Basic knowledge of computer security.

Frequently Asked Questions

What will you learn in this course?

Learn how malware works and all the routes that malware takes to do damage to your system.

Course duration

About 4 hours of interactive and theoretical content.

Enroll