Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Found a nice trainings sample for analysis of kernel mode rootkits↓https://samplepedia.cc/sample/465dc7a1068d0c7d31b4ffb0a013a59ddd0320dde4389748eed99f41ee0f51ae/83/

Found a nice trainings sample for analysis of kernel mode rootkits↓https://samplepedia.cc/sample/465dc7a1068d0c7d31b4ffb0a013a59ddd0320dde4389748eed99f41ee0f51ae/83/

Scheduled Pinned Locked Moved Uncategorized
3 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • struppigel@infosec.exchangeS This user is from outside of this forum
    struppigel@infosec.exchangeS This user is from outside of this forum
    struppigel@infosec.exchange
    wrote on last edited by
    #1

    Found a nice trainings sample for analysis of kernel mode rootkits
    ↓
    https://samplepedia.cc/sample/465dc7a1068d0c7d31b4ffb0a013a59ddd0320dde4389748eed99f41ee0f51ae/83/

    Link Preview Image
    xorhex@infosec.exchangeX 1 Reply Last reply
    0
    • struppigel@infosec.exchangeS struppigel@infosec.exchange

      Found a nice trainings sample for analysis of kernel mode rootkits
      ↓
      https://samplepedia.cc/sample/465dc7a1068d0c7d31b4ffb0a013a59ddd0320dde4389748eed99f41ee0f51ae/83/

      Link Preview Image
      xorhex@infosec.exchangeX This user is from outside of this forum
      xorhex@infosec.exchangeX This user is from outside of this forum
      xorhex@infosec.exchange
      wrote last edited by
      #2

      @struppigel if one writes a solution using the build-in blogging mechanism, does one have to be signin to read it? Or to put another way, can the solution be shared publicly (without logging in)?

      struppigel@infosec.exchangeS 1 Reply Last reply
      0
      • xorhex@infosec.exchangeX xorhex@infosec.exchange

        @struppigel if one writes a solution using the build-in blogging mechanism, does one have to be signin to read it? Or to put another way, can the solution be shared publicly (without logging in)?

        struppigel@infosec.exchangeS This user is from outside of this forum
        struppigel@infosec.exchangeS This user is from outside of this forum
        struppigel@infosec.exchange
        wrote last edited by
        #3

        @xorhex Everyone can view solutions and tasks but only after login you can share a solution

        1 Reply Last reply
        1
        0
        • R relay@relay.infosec.exchange shared this topic
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups