Lab-Malware and File Analysis-CST 640

Lab-Malware and File Analysis-CST 640
Screenshot 3 – Finding the File Type of the Yourname file (no Extension)
3. Use the file command in Linux to identify the file type of the yourname file, where yourname is your
first name. The use of anyone else’s name may result in an academic integrity review by your
professor. Please label your screenshot to receive full credit.
Take a screenshot of using the File Command on the Your Name Text File
Screenshot 4 – Creation of Yourname.exe file
4. Copy nc.exe to yourname.exe, where yourname is your first name. Take a screenshot of listing the
files and folders, including yourname.exe. The use of anyone else’s name may result in an academic
integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of the Your Name. EXE File being Liste
Screenshot 5 – Get the Hash of the Yourname.exe File
5. Use the md5sum command at the terminal to get the hash of the yourname.exe file. The use of
anyone else’s name may result in an academic integrity review by your professor. Please label your
screenshot to receive full credit.
Take a screenshot of using the md5sum command to get the hash of the Yourname. EXE Fil
Screenshot 6 – Identify the File Type of Yourname.exe
6. Use the file command at the terminal to identify the file type of the yourname.exe file. The use of
anyone else’s name may result in an academic integrity review by your professor. Please label your
screenshot to receive full credit.
Take a screenshot of using the File Command to Identify the Your Name. EXE File
Screenshot 7 – Getting the strings of the Yourname.exe File
7. Use the strings command at the terminal to get information about the contents of the
yourname.exe file. The use of anyone else’s name may result in an academic integrity review by
your professor. Please label your screenshot to receive full credit.
Take a screenshot of using the Strings Command to get information about the Your Name. EXE Fil
Screenshot 8 – Creating Yourname.exe Malware
8. Use the msfvenom command at the terminal to create malware called yourname.exe. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of using the msfvenom Command to get create the Your Name. EXE File
Screenshot 9– Finding the File Type of the Yourname file with .Doc Extension
9. Use the file command in Linux to identify the file type of the yourname file with a .doc extension,
where yourname is your first name. The use of anyone else’s name may result in an academic
integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of using the File Command on the Your Name File with the .Doc Extension
Screenshot 10– Use Virustotal to Analyze Yourname file with .Doc Extension
10. Use the virustotal website to analyze the yourname file with a .doc extension, where yourname is
your first name. The use of anyone else’s name may result in an academic integrity review by your
professor. Please label your screenshot to receive full credit.
Take a screenshot of the using virustotal on the Your Name File with the .Doc Extension
Conclusion
Students: In the box below, please explain the purpose of doing this lab below and explain
how in is relevant to Digital Forensics Technology and Practices. Highlight any new learning
that occurred while doing this lab.
Hint: Discuss tools and commands used in the lab.
Conclusion
APA References
Students: Please list at least 5 relevant APA References.

Answer Preview-Lab-Malware and File Analysis-CST 640

Lab-Malware and File Analysis-CST 640

$20.00

Posted

in

by

Tags: