March 9, 2023, 3 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

Malware authors use a variety of methods to help them gain an initial foothold on an endpoint. In this video, we'll analyze three different link (or LNK) files to see how they are abused. We'll use basic tools to grab their content and procmon to capture activity. This will allow us to understand where the next stage payload is coming from and identify the potential threat.

00:00 Introduction
00:34 The First LNK File
00:45 The LNK File Extension in Windows …

access authors basic capture coming endpoint files grab identify initial access introduction link lnk malicious malware payload procmon stage techniques threat tools understand video

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

SITEC- Systems Security Administrator- Camp HM Smith

@ Peraton | Camp H.M. Smith, HI, United States

Cyberspace Intelligence Analyst

@ Peraton | Fort Meade, MD, United States

General Manager, Cybersecurity, Google Public Sector

@ Google | Virginia, USA; United States

Cyber Security Advisor

@ H&M Group | Stockholm, Sweden

Engineering Team Manager – Security Controls

@ H&M Group | Stockholm, Sweden