Malicious software designed to disrupt, damage, or gain unauthorized access to systems. Categories include viruses, worms, trojans, ransomware, spyware, rootkits, and wipers.
Attacker
In the Attacker Malware Analysis Lab, participants adopt the role of a blue teamer, focusing on an offline investigation to identify, analyze, and neutralize malware threats. This hands-on lab is designed to simulate a real-world scenario where attackers have deployed malicious executables to compromise a system. Participants will utilize tools such as VirusTotal and other forensic utilities to gather detailed information about the malicious files. Through this lab, they will learn to recognize the signs of malware infections, perform thorough static analysis of executables, and implement effective countermeasures to safeguard the network from future attacks.
BLUE TEAM
Keylogger
In the Keylogger Malware Analysis Lab, participants step into the role of a blue teamer, tasked with identifying, analyzing, and neutralizing a keylogger malware threat within a corporate environment. This hands-on lab is designed to simulate a real-world scenario where attackers have deployed a keylogger to secretly capture keystrokes and steal sensitive information. Participants will learn to recognize the signs of keylogger infections, use forensic tools to analyze malicious binaries, and implement effective countermeasures to protect the network from future attacks.
BLUE TEAMPut theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free