Index 578
Index 578
This work is licensed under a Creative Commons Attribution 4.0 International License, by A. Cailliau
Template by A. D’hondt, https://github.com/dhondta/tex-course-index-template 1
FOR578 – Cyber Threat Intelligence
This work is licensed under a Creative Commons Attribution 4.0 International License, by A. Cailliau
Template by A. D’hondt, https://github.com/dhondta/tex-course-index-template 2
FOR578 – Cyber Threat Intelligence
This work is licensed under a Creative Commons Attribution 4.0 International License, by A. Cailliau
Template by A. D’hondt, https://github.com/dhondta/tex-course-index-template 3
FOR578 – Cyber Threat Intelligence
This work is licensed under a Creative Commons Attribution 4.0 International License, by A. Cailliau
Template by A. D’hondt, https://github.com/dhondta/tex-course-index-template 4
FOR578 – Cyber Threat Intelligence
This work is licensed under a Creative Commons Attribution 4.0 International License, by A. Cailliau
Template by A. D’hondt, https://github.com/dhondta/tex-course-index-template 5
FOR578 – Cyber Threat Intelligence
U Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–14
WFP → Windows File Protection . . . . . . . . . . . . . . . 2–21
URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–72 Whois . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–34
Uroburos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3–47 Whois HackingTeam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4–80
US-CERT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–27 Wireshark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–86
V Y
VERIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–119-121 YARA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–6
Verizon Data Breach . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–119 Alternative . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–9
Victim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–45 Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–10
VirusTotal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3–14-20 filesize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–12
Volatility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2–57, 2–92-93 Import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–11
Jump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–9
Key points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–8
W MZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–12
Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–11
WannaCry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4–85 Rule (example) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5–7
Watering hole . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1–40 yarascan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–10
Weaponization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2–13 yextend . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5–10
This work is licensed under a Creative Commons Attribution 4.0 International License, by A. Cailliau
Template by A. D’hondt, https://github.com/dhondta/tex-course-index-template 6