• 347-586-9386
  • Info@NetworkDefenseSolutions.com
Network Defense Solutions, Inc.
  • Home
  • Services
    • Incident Response
    • Services & Monitoring
    • Software & Downloads
    • Support Ticketing
    • Training & Education
    • Service Appointment
    • Schedule Repair
    • Data Backup Locations
    • Remote Support
    • Service Inquiry
    • Knowledge Base
  • Articles
    • BCDR Articles
    • Ethical Hacking
    • Forensics
    • Incident Response
    • Information Leakage
    • Malware & Phishing Analysis
    • System Hardening
    • Hacking & Security CTFs
  • Members
    • Log In
    • Register

Warning! This section contains documentation that requires analysts to utilize live malware to understand malware analysis. Safeguarding your data is not the responsibility of Network Defense Solutions, Inc. All readers, students and analysts MUST provide their own method of safeguarding their systems and data. If you agree to this warning, you may proceed. Otherwise, please do not run any of the live samples on your network or workstation!
Filters
Title Author Hits
Windows - PDF File Analysis : Register to read more … Hits: 0
Windows - De-obfuscation of VBS / Macros : Register to read more … Hits: 0
Windows - Word Document Analysis : Register to read more … Hits: 0
Windows - Static Analysis With PE Studio : Register to read more … Hits: 0
Windows - Static Analysis with Strings : Register to read more … Hits: 4
Windows - DLL Searches and Dependencies : Register to read more … Hits: 0
Windows - Hex Editing & Partial Code Analysis : Register to read more … Hits: 0
Windows Malware Analysis - Finding UPX and other packers & unpacking / Decoding : Register to read more … Hits: 1
Windows Malware Analysis - Understanding File Types & Extensions : Register to read more … Hits: 1
Windows Static Malware Analysis : Register to read more … Hits: 1
Windows Malware Analysis - Prerequisite Hits: 3
Finding Phishing Site IOC's : Register to read more … Hits: 1
Phishing Site Microsoft Network Monitor Analysis : Register to read more … Hits: 1
Phishing Site Wireshark Analysis : Register to read more … Hits: 1
Educated Guessing & Isolating Legitimate Businesses : Register to read more … Hits: 1
Using VirusTotal, IPVoid and Others : Register to read more … Hits: 1
Link & Domain Analysis : Register to read more … Hits: 1
Understanding IOC's & Artifact Collection : Register to read more … Hits: 1
Automate E-Mail Header Analyzer : Register to read more … Hits: 1
E-Mail Analysis - Origins of an E-Mail : Register to read more … Hits: 1
  • 1
  • 2
  • 3
Page 2 of 3
© 2025 Network Defense Solutions, Inc. | Blogs | Forum | Terms & Conditions | Legal | Privacy Statement | Contact | Service Inquiry | Media
Sign In
  • Home
  • Services
    • Incident Response
    • Services & Monitoring
    • Software & Downloads
    • Support Ticketing
    • Training & Education
    • Service Appointment
    • Schedule Repair
    • Data Backup Locations
    • Remote Support
    • Service Inquiry
    • Knowledge Base
  • Articles
    • BCDR Articles
    • Ethical Hacking
    • Forensics
    • Incident Response
    • Information Leakage
    • Malware & Phishing Analysis
    • System Hardening
    • Hacking & Security CTFs
  • Members
    • Log In
    • Register
  • 347-586-9386
  • Info@NetworkDefenseSolutions.com