Jan. 5, 2024, 6 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

Malware often requires access to the internet, but what if you don't want to let it connect out? Fakenet-NG to the rescue! In this video, we'll explore this useful utility for simulating many popular networking protocols - allowing you to get valuable insight into your malware's network behavior without giving it full access to the internet.

Looking for full cyber security courses? Check out my courses on Pluralsight! https://www.pluralsight.com/authors/josh-stroschein

1:40 Setting your VMs network
2:08 Sample program and analysis goals …

access connect don insight internet malware network networking popular protocols rescue simulation utility video

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India

Cyber Program Manager - CISO- United States – Remote

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700

Network Security Engineer (AEGIS)

@ Peraton | Virginia Beach, VA, United States

SC2022-002065 Cyber Security Incident Responder (NS) - MON 13 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Information Systems Security Engineer

@ Booz Allen Hamilton | USA, GA, Warner Robins (300 Park Pl Dr)