jess LAND
       www.jessland.net
        Sponsored by:       
One eSecurity
www.one-esecurity.com
JISK Knowledgebase >>    About    News    Essentials    Architecture    FWs    IDS/IPS    Honeypots    Malware    Forensics   
  +  JSS Home    Projects    JSS Community    Events    News    Docs    About    Contact .

JISK > Malware > Analysis > Behavioural Malware Section Map

Malware Behavioural Analysis

Content Leader: Jess Garcia - Last Updated: November 25, 2006


Analysis Steps

 Process  Tools   
 File Integrity Checking  Winalysis 
 File monitoring  FileMon 
 Process Monitoring  Process Explorer 
 Network Monitoring - Open Ports (Internal)  TCPView - FPort 
 Network Monitoring - Open Ports (External)  nmap - Superscan 
 Vulnerability Scan  nessus 
 Network Monitoring - Sniffing  tcpdump - snort - wireshark 
 Network Monitoring - Network Activity  TDIMon 
 Network Monitoring - Promiscuous Mode Detection  Promiscdetect 
 Registry Monitoring  Regmon 

Copyright © 2000-2008 Jessland - Jess Garcia's Website - All rights reserved.