Action: In this step, you will implement your own encryption code.
You may use a programming language of your choice. Then, you will need to choose
a cryptographic library. Then, you will choose an appropriate encryption algorithm.
Alternatively, you may a cryptographic utility, and write a shell code.
[login to view URL]: In this step, you need to implement a method for infecting a victim.
Example: A victim may open a phishing email which contains a malicious
executable/script as an attachment.
3. Monitoring: To be able to detect a ransomware, we need to be able to monitor your
environment. Example: OSSEC Host IDS has a file integrity monitoring functionality.
Provide your own detection component
4. Detection: In this stage, you will analyze the data collected by the monitoring
component. You need to define a policy: which operations on files are permitted and
which are not (and by whom). Decide on how to detect the policy violation, i.e., create
a rule which triggers your mitigation measure.
[login to view URL]: In this stage, you will define a countermeasure which is triggered by
the above-mentioned rule
16 pekerja bebas membida secara purata $187 untuk pekerjaan ini
Hi I have 8 years of experience in ⭐ python for cryptography ⭐. I've read the project description carefully and can start work immediately. Let`s discuss about more detail in chat box. Best regards!