|
|
|
@ -1,7 +1,6 @@
|
|
|
|
|
#### General |
|
|
|
|
|
|
|
|
|
Knowledge-Check: |
|
|
|
|
Ask the students for explain how the ransomware work and the impact of it. |
|
|
|
|
##### Ask the students for explain how the ransomware work and the impact of it. |
|
|
|
|
|
|
|
|
|
###### Is the student able to explain clearly what ransomware means? |
|
|
|
|
|
|
|
|
@ -16,34 +15,31 @@ Ask the students for explain how the ransomware work and the impact of it.
|
|
|
|
|
Files that must be inside your repository: |
|
|
|
|
|
|
|
|
|
- Your program source code. |
|
|
|
|
- a README.md file, Which clearly explains how to use the program. |
|
|
|
|
|
|
|
|
|
###### Does the required files present? |
|
|
|
|
- a README.md file, Which clearly explains how to use the program. |
|
|
|
|
|
|
|
|
|
##### Evaluate the student's submission |
|
|
|
|
###### Are the required files present? |
|
|
|
|
|
|
|
|
|
Create an official Windows virtual machine. |
|
|
|
|
Scan the student ransomware in windows defender. |
|
|
|
|
##### Create an official Windows virtual machine and scan the student ransomware in windows defender. |
|
|
|
|
|
|
|
|
|
###### Does the program bypass the windows defender without any detection? |
|
|
|
|
|
|
|
|
|
Scan the student ransomware in [virustotal](https://www.virustotal.com/). |
|
|
|
|
##### Scan the student ransomware in [virustotal](https://www.virustotal.com/). |
|
|
|
|
|
|
|
|
|
###### Does the program bypass more than 80% of Security vendors in [virustotal](https://www.virustotal.com/)? |
|
|
|
|
|
|
|
|
|
Create some files with random data in the machine and run the program. |
|
|
|
|
##### Create some files with random data in the machine and run the program. |
|
|
|
|
|
|
|
|
|
###### Does the program change all files in the machine with the student extension(encrypt)? |
|
|
|
|
|
|
|
|
|
###### Does the program add a text file with contact info and the encryption code (to recover the data)? |
|
|
|
|
|
|
|
|
|
Imagine that they are your files and try to decrypt them without the help of the student. |
|
|
|
|
###### Imagine that they are your files and try to decrypt them without the help of the student. |
|
|
|
|
|
|
|
|
|
###### They are no way to decrtpy the files? |
|
|
|
|
###### There are no way to decrypt the files? |
|
|
|
|
|
|
|
|
|
Ask the student to create a decryption program by using the encryption code. |
|
|
|
|
Run the decryption program. |
|
|
|
|
##### Ask the student to create a decryption program by using the encryption code. Run the decryption program. |
|
|
|
|
|
|
|
|
|
###### Do the files restore with their data? |
|
|
|
|
|
|
|
|
|
###### Does the decryption program is usage unique for each victim? |
|
|
|
|
###### Is the decryption program usage unique for each victim? |
|
|
|
|