Summary
Keywords
Full Transcript
In this full series we will talk about Incident Response and it will be a Free Training Course for everyone. Today is Day-19 and we are going to explore the easiest way to remove malwares from your website. Malware is often used by hackers to attack legitimate websites. They prefer to attack websites that arenβt well-protected because itβs easier to infect them. Infecting websites can be done in a variety of ways. They use phishing, fraudulent websites, backdoors, source code alteration, disguised plugins, and drive-by downloads to spread malware. Malicious software (malware) is installed on a website when it is hacked, either by altering existing files or folders or by adding new files. Malware is software that is designed to harm your website and is difficult to detect. Figuring out whether part of the code is malware that has to be removed can be difficult if you are unfamiliar with how website code looks. Because each hack is unique, itβs simply a matter of searching through your websiteβs files and figuring out whatβs not supposed to be there. So today we are going to explore all such steps which you need to know for your incident response job and even to crack your SOC interview. π₯Also, as a Bonus, you can now download and utilize the Power Forensics Tool which will come handy for analyzing and collecting data for any Linux machines. πLINKs for your requirements- ------------------------------------------------------------------------------------------------------------------------- 1. Power Forensics- https://github.com/archanchoudhury/Power-Forensics WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!! ------------------------------------------------------------------------------------------------------------------------- INCIDENT RESPONSE TRAINING Full Course πhttps://youtube.com/playlist?list=PLjWEV7pmvSa4yvhzNsCjOJovOn1LLyBXB DFIR Free Tools and Techniques π https://youtube.com/playlist?list=PLjWEV7pmvSa6f-NTpXsaUYWZLjLAB_0TS Windows and Memory Forensics π https://youtube.com/playlist?list=PLjWEV7pmvSa50erciZUSnzvE7nK0FyvsH Malware Analysis π https://youtube.com/playlist?list=PLjWEV7pmvSa6u32RongesgDtkfKBfrFWW SIEM Tutorial π https://youtube.com/playlist?list=PLjWEV7pmvSa7cXTkCppnYHERUdy8Dd71x Threat Hunt & Threat Intelligence π https://youtube.com/playlist?list=PLjWEV7pmvSa5UTZlsWp5wRnURNbeMS-fu β Timelines ------------------------------------------------------------------------------------------------------------------------- 0:00 β© Introduction 1:20 β© How websites Get Infected 8:45 β© How to find if Infected 13:04 β© Scan your Content 14:30 β© Clean up your Content 19:51 β© Manual Malware Removal 27:27 β© Useful Commands 28:15 β© Power Forensics 33:56 β© Summarize ππ² FOLLOW ME EVERYWHERE- ------------------------------------------------------------------------------------------------------------------------- β LinkedIn: https://www.linkedin.com/company/blackperl β You can reach out to me personally in LinkedIn as well- https://bit.ly/38ze4L5 β Twitter: @blackperl_dfir β Git: https://github.com/archanchoudhury β Insta: (blackperl_dfir)https://www.instagram.com/blackperl_dfir/ β Can be reached via archan.fiem.it@gmail.com SUPPORT BLACKPERL ------------------------------------------------------------------------------------------------------------------------- βββ¦βββ¦ββββ¦ββ¦β¦β¦β¦ββββ βββ£βββββ£ββ£ββ£ββ£βββ£ββ£ β βββββββ ββββ£βββββββ£ βββ©βββ©ββ©ββ©ββ©βββ©ββ©ββ β‘οΈ SUBSCRIBE, Share, Like, Comment β Buy me a Coffee π https://www.buymeacoffee.com/BlackPerl π§ Sponsorship Inquiries: archan.fiem.it@gmail.com ------------------------------------------------------------------------------------------------------------------------- π Thanks for watching!! Be CyberAware!! π€
