1 00:00:00,570 --> 00:00:04,450 Hello and welcome to a new section in this section. 2 00:00:04,470 --> 00:00:10,610 We are going to use real life Java malware. 3 00:00:11,100 --> 00:00:19,800 We are going to analyze Java right here at our remote access tools, sometimes also known as remote 4 00:00:19,800 --> 00:00:21,020 access Trojans. 5 00:00:21,510 --> 00:00:29,130 So in this first video in this session, we are going to talk about the principles of analyzing Java, 6 00:00:29,130 --> 00:00:40,890 read what is a threat that are malicious programs that run invisibly on host species and permit an intruder 7 00:00:41,100 --> 00:00:51,230 remote access control features of a rat race, often for quite a wide variety of functionality. 8 00:00:51,870 --> 00:01:01,440 Key logger, screen capture program execution, file modification and information stealing, unlike 9 00:01:01,440 --> 00:01:05,290 ransomware attempt to remain hidden. 10 00:01:06,780 --> 00:01:14,670 It also may be used as a pivot point or a launching pad for infecting other systems. 11 00:01:15,960 --> 00:01:22,730 Also, persistence, persistence mean that it will restart when the computer reboot. 12 00:01:24,360 --> 00:01:31,800 He also leaves behind important clues, for example, in a registry of certain hidden locations. 13 00:01:34,170 --> 00:01:42,930 Let exercise instructions, so I would like you to try this on your own first before you view the walkthrough, 14 00:01:43,170 --> 00:01:50,990 which is coming up, go in the file called Java Real World Cross, Red Dot. 15 00:01:51,000 --> 00:01:56,870 See, the password on file is cracking lessons dot com. 16 00:01:57,900 --> 00:02:01,080 Remember to use a virtual machine to analyze it. 17 00:02:01,980 --> 00:02:04,080 Good luck to you in the next video. 18 00:02:04,350 --> 00:02:05,670 Thank you for watching.