Automating Bulk Intelligence Collection

Automating Bulk Intelligence Collection

via YouTube Direct link

Intro

1 of 27

1 of 27

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Automating Bulk Intelligence Collection

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 When Automation is Needed?
  3. 3 What to Automate?
  4. 4 Planning Automation for Data Mining
  5. 5 Finding Needle in a Hayshack
  6. 6 Prepare Checklist of Desired Results
  7. 7 Consider Inserting Data in a Database!
  8. 8 Start with Manual Analysis
  9. 9 Extracting Data from Malware Files
  10. 10 Analyze Body of Email
  11. 11 Analyze json File with mime
  12. 12 Extracting Malicious Domains from wsf file!
  13. 13 Process of Analyzing Json Mime File Download Json Mime
  14. 14 Detect the First Chain!
  15. 15 Email Campaign Featuring a PDF Attachment
  16. 16 Extract URL from PDF
  17. 17 CVE-2017-0199 Malicious RTF Document
  18. 18 Use Known Tools for Analysis
  19. 19 Apply Foremost on the File!
  20. 20 Malicious Extracted Files
  21. 21 Introducing Yalda!
  22. 22 Yalda Framework
  23. 23 Data Storage File Type
  24. 24 Applying Quality Control
  25. 25 Conclusion
  26. 26 How to use Yalda
  27. 27 Code is available at Fidelis gitHub

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.