Overview
Introduction
The Trojan Protection module provides you with the instructions and devices to develop your hands-on skills in the following topics.
- Use malware and Trojan analysis tools
- Monitor ports and processes
- Monitor and protect files and folders
Lab time: It will take approximately 1 hour to complete this lab.
Objectives
The following objectives are covered in this lab.
- System Hacking
Exercise 1 - Use Malware and Trojan Analysis Tools
Every day, thousands of malware are released by the hackers. These malware are designed to work in different ways. Some are not harmful and cause minimal damage and others are extremely chaotic in nature. You can use different types of malware and Trojan analysis tools to ensure their impact is reduced or minimized.
Exercise 2 - Monitor Ports and Processes
In this exercise, you will learn the following:
Port Monitoring Tools: TCPView and CurrPorts To gain better understanding of these tasks, please refer to your course material or use your preferred search engine to research this topic in greater detail.
Exercise 3 - Monitor and Protect Files and Folders
You will now have a look at a different variety of algorithms in a direct comparison and using Hash Calc which is a calculator that computes message digests, checksums, and HMACs for files, as well as for text and hex strings. It provides 13 popular hash and checksum algorithms for calculations.
In this exercise, you will learn the following:
- Install of Hash Calc
- Using Hash Calc
Comprehensive Learning
See the full benefits of our immersive learning experience with interactive courses and guided career paths.