0 1 00:00:12,250 --> 00:00:14,740 Hello Friends Welcome back to the course. 1 2 00:00:14,980 --> 00:00:21,410 Let us discuss the next important topic here and that's about the hardware requirements. 2 3 00:00:21,670 --> 00:00:26,280 So what will be the hardware requirements for completing this course. 3 4 00:00:26,290 --> 00:00:34,570 The requirements are pretty basic and almost all modern day laptops are PCs will have this configuration. 4 5 00:00:35,050 --> 00:00:42,490 but it is ideal to have a CPU of two to three GHZ of processing power and RAM of 8 to 5 6 00:00:42,490 --> 00:00:53,170 16 GB. The RAM will be critical here because we have to run a bunch of virtual machines that will be 6 7 00:00:53,170 --> 00:00:59,800 like a safe environment where we will be executing and analyzing the malware files. 7 8 00:00:59,800 --> 00:01:03,250 We would also require at least 200 GB of storage space. 8 9 00:01:03,250 --> 00:01:04,590 That's the ideal scenario. 9 10 00:01:04,600 --> 00:01:10,060 But if you have less than that for example let's say 60 to 80 GB of space and that would also work 10 11 00:01:10,060 --> 00:01:16,450 out but it would be best to have at least 100 GB storage space free to perform all the operations 11 12 00:01:16,450 --> 00:01:17,540 of this course. 12 13 00:01:19,070 --> 00:01:24,530 Coming to the software requirements. The requirements again here are pretty basic. 13 14 00:01:24,590 --> 00:01:32,720 And as we proceed in the course we'll be talking more about what kinds of tools and softwares would 14 15 00:01:32,720 --> 00:01:37,870 be required to do some specific analysis goals. 15 16 00:01:38,060 --> 00:01:47,530 So starting with the operating system so it would be good to have either Windows or a UNIX based machine. 16 17 00:01:47,540 --> 00:01:53,290 Either Mac or the next that would be sufficient to hold your virtual environment. 17 18 00:01:53,840 --> 00:02:03,170 You should have Windows 10 or Windows 7 as a guest OS or as a virtual OS because most of the malware 18 19 00:02:03,170 --> 00:02:10,010 analysis tools are designed for Windows environment so it would be ideal to have a virtual image of 19 20 00:02:10,100 --> 00:02:17,560 either Windows 10 or Windows 7 where we can do the analysis of the file formats. 20 21 00:02:17,570 --> 00:02:21,940 We would also need virtualization software like VMware or virtual box. 21 22 00:02:22,070 --> 00:02:29,870 Obviously these softwares will help us to launch the guest OS which is a Windows environment and we 22 23 00:02:29,870 --> 00:02:34,760 will be setting up our entire analysis lab in this guest environment. 23 24 00:02:34,910 --> 00:02:40,810 The next video will basically talk about how we are going to set up the entire environment here. 24 25 00:02:40,880 --> 00:02:44,710 There will be some additional tools that will be required as well during the course. 25 26 00:02:44,750 --> 00:02:52,980 Some of them have been listed here like IDAPro, Wireshark, PEstudio, CFF Explorer, text editor etc.. 26 27 00:02:53,280 --> 00:02:55,430 this is not the complete list. 27 28 00:02:55,430 --> 00:03:01,340 There will be few more tools that will be required as well and there are a bunch of ways how we can 28 29 00:03:01,340 --> 00:03:02,110 go through it. 29 30 00:03:02,120 --> 00:03:10,430 We can either install all these tools in a single go when we are setting up our malware lab or we can 30 31 00:03:11,120 --> 00:03:20,480 set up a basic environment where we have the windows guest OS running and we can start using tools one 31 32 00:03:20,480 --> 00:03:25,810 by one as we proceed with the different steps of analysis. 32 33 00:03:25,880 --> 00:03:27,230 So both options are there. 33 34 00:03:27,230 --> 00:03:29,580 We'll see how we want to take it forward. 34 35 00:03:31,290 --> 00:03:37,930 Then we would also need malware samples that can be downloaded from Virustotal and other open sources. 35 36 00:03:38,340 --> 00:03:43,410 Obviously because we are going to do analysis of malware files and malicious files it's ideal to have 36 37 00:03:43,410 --> 00:03:49,200 a separate lab kind of environment where we can have these files downloaded where we can start 37 38 00:03:49,200 --> 00:03:50,250 analyzing them. 38 39 00:03:50,490 --> 00:03:58,410 And because these are actual malware samples, actual infected files it would be ideal to have them saved 39 40 00:03:59,280 --> 00:04:05,320 in an environment where it cannot really infect your host operating system. 40 41 00:04:05,370 --> 00:04:09,700 So we would need sources from there we can download all these malware samples. 41 42 00:04:09,840 --> 00:04:15,250 You can get the information either from Virustotal or probably some other open sources. 42 43 00:04:15,270 --> 00:04:18,400 There are a lot of different sources and very good sources 43 44 00:04:18,390 --> 00:04:24,230 From there we can collect malware samples and we'll be talking about them in great detail later on. 44 45 00:04:24,270 --> 00:04:31,020 I'll also try and provide you these malware samples by hosting them on my personal cloud account. 45 46 00:04:31,110 --> 00:04:34,920 If it doesn't violate the policies of the cloud services. 46 47 00:04:35,190 --> 00:04:41,510 And probably from there as well you can download the sample and analyze the courses. 47 48 00:04:41,820 --> 00:04:44,150 So that's all about this video. 48 49 00:04:44,180 --> 00:04:50,570 And in the next video probably we will go ahead and discuss about how we can set up our malware lab. 49 50 00:04:50,880 --> 00:04:51,910 Thanks a lot guys.