cognitive cybersecurity intelligence

News and Analysis

Search

Project #1: Cybersecurity HomeLab: Part 7 | by Mr.E | Jan, 2025

The author explains how to collect data on potential malware attacks on a system using telemetry, and create malware on a virtual machine for learning purposes. They use a Kali virtual machine to attack a Windows machine, utilizing the network discovery tool Nmap to scan the target. The author also uses MSFvenom to develop basic malware, using a handler to listen for network connections from the payload. A HTTP server is set up to facilitate the transfer of the malware between machines in this simulated attack.

Source: medium.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts

10 Best Free Blue Team Tools in 2025

Companies enhance their cybersecurity through assessments by employing “red teams” for offensive testing and “blue teams” for defense. Blue teams focus on protecting assets, conducting