COSC 5330 Malware Analysis Assignment

Assignment Help Computer Engineering
Reference no: EM132555670

COSC 5330 Malware Analysis - Sam Houston State University

It turns out that I've grown tired of grading the assignments for this course. To this end, I've come up with a challenge which will resolve this. I have designed a Cryptovirus (also called Ransomware) which will encrypt your hard drive using strong RSA-2048 and AES-256 cryptographic protocols. You can find a lot of information about these new breeds of malware

I don't want a ransom of course. I merely do not want to grade the assignments! So, encrypting your drives will solve this predicament. However, we have an agreement - I would like you to solve a few simple "puzzles" I have created before unleashing this vicious malware on your systems. Furthermore, I promise not to destroy your machines if you solve these puzzles and let me know by the deadline. You can accomplish this by uploading your solutions to Blackboard by the deadline and be rest assured that the malware will be safely terminated if and only if I am completely convinced that you have truly solved these challenges. To this end, I strongly recommend that you start working on this task before your time expires. Your mission is to solve these puzzles and neutralize this virus before the due date. Good luck!

For instance:

1. This current executable does not have any debug symbols

2. You will need to identify if this executable was compiled using gcc, Visual Studio, Borland or some other compiler and which calling convention was used by the compiler - cdecl, stdcall or fastcall.

So, naturally, this assignment is more challenging than the earlier ones, and rightfully so! However, now you have new tools in your arsenal, including Olly debugger which should help much! I have assumed the following in designing this assignment:

3. You have spent a good amount of time mastering Olly and have watched several YouTube video tutorials and have thoroughly read the chapters assigned in this week's reading.

4. You have solved the lab exercises at the end of most, if not all, chapters in the books thus far.

5. You have a thorough mastery of IDA Pro, Olly and other basic static and dynamic tools that we have explored in the book and assignments thus far.

6. You are confident in creating snapshots of your virtual machine and utilizing all the important features of VirtualBox to your advantage.

7. You have a good understanding of C and are comfortable with reading/writing C code and understand the different constructs of a typical C program. For instance, this assignment uses several C constructs which you are expected to not only understand, but recognize them on-the-fly as you are working through the assignment. To this end, please re-read the appropriate chapters in the book if needed.

8. You have solved all the assignments thus far and have ensured that you understand everything that the past assignments have entailed.

9. You have a healthy level of curiosity and the ability, willingness to work hard to solve the challenges thrown at you.

10. Above all, you are able to smartly identify what your objective is and not get bogged down in minutiae and unnecessary detail that don't help you reach your desired goals.

This course and the techniques you learn therein should put you on firm footing not only for malware analysis, but in general, reverse engineering, security flow analysis, memory integrity analysis, general principles of digital forensics, security testing, network signature generation, intrusion detection, vulnerability analysis, software exploits, etc.

Attachment:- Malware Analysis.rar

Reference no: EM132555670

Questions Cloud

Analyses the characteristics of the age of romanticism : Analyses the Characteristics of the age of Romanticism of Coleridge:The rime of the ancient Mariner - Uses only 4 quotations and explain those quotations
Define suitable six sigma project : Identify an important problem around a school, church, or volunteer group, and define a suitable Six Sigma project.
Most effective chemical an antiseptic or disinfectant : -Is the most effective chemical an antiseptic or disinfectant? Is the least effective chemical a disinfectant or an antiseptic?
What are the steps to perform a catalase test : What are the steps to perform a catalase test
COSC 5330 Malware Analysis Assignment : COSC 5330 Malware Analysis Assignment Help and Solution, Sam Houston State University - Assessment Writing Service - creating snapshots of your virtual machine
Cost and schedule intensive phase of project life-cycle : Explain why the project execution phase has the most cost and schedule intensive phase of the project life-cycle.
What does competent imply about the e coli cells : E. coli cells that are unable to catabolize ampicillin are made competent. These competent E. coli cells are then transformed
Cultivate ethical leadership standards : To develop your own set of ethical leadership standards, begin by conducting five mini-case studies.
Will the operating cycle generate cash requirements : Long supplier credit periods (60 days) and very low administrative costs. Will the operating cycle generate cash requirements or a cash surplus?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program called that accepts as arguments files

Write a C++ program called that accepts as arguments two files that contain these compressed upper triangular matrices.

  Different access methods like ofdma sdma tdma cdma and fdma

different access methods such as ofdmasdma tdma cdma and fdma rely on cross-layer optimization to different degrees.

  Explaining arp command

The arp command: arp -s InetAddr EtherAddr enables you to manually add an entry to ARP cache which resolves the IP address InetAddr to the physical address EtherAddr.

  Explain security or master plan and countermeasures

For this assignment, you are the information security manager for the county of Rockdale. The county just elected a new sheriff. He does not have a keen.

  What must be the elevation difference for the two tanks

Two water tanks, open to the atmosphere, are connected by a pair of parallel pipes each having an inside diameter of 2.5 cm. The pipes are 20 m long.

  What role does open access software play

What role does open access software play in the evolution of technology? How has the growth in Linux popularity facilitated the growth of proprietary tools?

  List the security services provided by a digital signature

List the security services provided by a digital signature. Compare and contrast attacks on digital signatures with attacks on cryptosystems.

  Why relational database was the best choice

create a relational database containing information about music performers, their recordings, and the composers of the music they recorded.

  What is the index of the top element of the stack

What is the index of the top element of the stack. What is the index of the bottom element of the stack?

  Write a vba module that has your program read 3 numbers

Write a VBA module that has your program read 3 numbers from an excel spread sheet, etc. Can someone please show me in detail what to do.

  Develop program that used as point-of-order inventory system

Develop a program that could be used as a point-of-order inventory system. Read in a database from a file that represents the store inventory.

  Write a program to break a number into its individual digits

Write a program to break a number into its individual digits, for example to turn 1729 into 1, 7, 2 and 9. It is easy to get last digit of a number n as n % 10.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd