Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Studies in Cybercrime: The great SONY hack of 2014 - $20 USD

 
 
 

Module Description
   

Pay for course: $0
 
The Great Sony Hack of 2014 – Videos

In November of 2014 an elite group of North Korean hackers executed a devastating cyber attack against Sony Pictures Entertainment in retaliation for their new movie, The Interview, a comedy depicting the assassination of Kim Jong Un. The attackers stole all of Sony's most private data and then strategically released it to the media. All of Sony's financial data, unreleased movies, and embarrassing e-mails mocking celebrities and the president of the United States. Furthermore, their malware destroyed Sony's computers, cutting off their access to their own data.

This attack grew from cyber terror to real terrorism as the story developed and it resulted in President Obama executing an executive order shifting US economic policy against North Korea. This was truly one of the most significant hacks in the history of Cybercrime.

This course will explain the attack in deep technical detail by analyzing the malware used by the North Koreans. Contained within these binaries is all the information Sony needs to understand how a worm spread throughout their network and destroyed their infrastructure. You will learn how Sony was victimized and what they could have done to prevent it. By the end of this course you will know more about this attack than the newscasters, more than top cyber security experts, and quite possibly more than Sony themselves.

1 - Sony Hack - Overview.mp4   (00:22:43.48)

2 -PEStudio Analysis of Destover_C.mp4   (00:11:40.04)

3 - PEStudio Analysis of DestoverA.mp4   (00:05:24.89)

4 - Decoding XOR strings from the Destover_A malware.mp4   (00:11:00.63)

5 - Using OllyDbg to Patch Sleep Functions.mp4   (00:07:32.07)

6 - Dynamic Analysis of Destover_C.mp4   (00:07:02.53)

7 - DestoverC_Malware Artifact Analyisis.mp4   (00:15:34.53)

8 - Destover IP Callout Investigaton.mp4   (00:05:46.91)

9 - Boot Sector Rewrite_ DestoverA differences.mp4   (00:05:05.81)

 
You will need Winrar to unzip the lab files. Get it here
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved