• 347-586-9386
  • Info@NetworkDefenseSolutions.com
Network Defense Solutions, Inc.
  • Home
  • Services
    • Incident Response
    • Services & Monitoring
    • Software & Downloads
    • Support Ticketing
    • Training & Education
    • Service Appointment
    • Schedule Repair
    • Data Backup Locations
    • Remote Support
    • Service Inquiry
    • Knowledge Base
  • Articles
    • BCDR Articles
    • Ethical Hacking
    • Forensics
    • Incident Response
    • Information Leakage
    • Malware & Phishing Analysis
    • System Hardening
    • Hacking & Security CTFs
  • Members
    • Log In
    • Register

Warning! This section contains documentation that requires analysts to utilize live malware to understand malware analysis. Safeguarding your data is not the responsibility of Network Defense Solutions, Inc. All readers, students and analysts MUST provide their own method of safeguarding their systems and data. If you agree to this warning, you may proceed. Otherwise, please do not run any of the live samples on your network or workstation!
Filters
Title Author Hits
Linux Static Malware Analysis - Static Analysis with HexEdit, Strings & Head : Register to read more … Hits: 8
Linux Static Malware Analysis - File Identification : Register to read more … Hits: 0
Linux Malware Analysis - Start Up Locations : Register to read more … Hits: 0
Linux Malware Analysis Hits: 1
Windows Event Viewer : Register to read more … Hits: 0
Windows Command History - Post Execution Forensics : Register to read more … Hits: 0
Windows Forensic Memory Analysis - Post Execution : Register to read more … Hits: 0
Windows Dynamic Malware Analysis - Malware Process Scanner : Register to read more … Hits: 0
Windows Dynamic Analysis - Analysis with wmic : Register to read more … Hits: 0
Windows Dynamic Analysis - Forensic Analysis with netstat : Register to read more … Hits: 0
Windows Dynamic Analysis - Finding Newly Created Files : Register to read more … Hits: 0
Windows Dynamic Analysis - Finding Registry Changes : Register to read more … Hits: 0
Windows System Analysis - Post Execution : Register to read more … Hits: 0
Windows Dynamic Analysis - Traffic Analysis with Wireshark : Register to read more … Hits: 0
Windows Dynamic Analysis - Traffic Analysis with Microsoft Network Monitor : Register to read more … Hits: 0
Windows - Dynamic Malware Analysis : Register to read more … Hits: 0
Static Analysis - Scrutinizing Disk Images : Register to read more … Hits: 0
File Identification Tools : Register to read more … Hits: 0
Windows Static Malware Analysis - IOCollector : Register to read more … Hits: 0
JPEG File Analysis : Register to read more … Hits: 0
  • 1
  • 2
  • 3
Page 1 of 3
© 2025 Network Defense Solutions, Inc. | Blogs | Forum | Terms & Conditions | Legal | Privacy Statement | Contact | Service Inquiry | Media
Sign In
  • Home
  • Services
    • Incident Response
    • Services & Monitoring
    • Software & Downloads
    • Support Ticketing
    • Training & Education
    • Service Appointment
    • Schedule Repair
    • Data Backup Locations
    • Remote Support
    • Service Inquiry
    • Knowledge Base
  • Articles
    • BCDR Articles
    • Ethical Hacking
    • Forensics
    • Incident Response
    • Information Leakage
    • Malware & Phishing Analysis
    • System Hardening
    • Hacking & Security CTFs
  • Members
    • Log In
    • Register
  • 347-586-9386
  • Info@NetworkDefenseSolutions.com