Malware Defense Lab

25 Ethical • Defensive • Simulation-Only Labs

Lab 1: Malware Ethics & Authorization

Why malware analysis must always be legal, ethical, and controlled.

Lab 2: What Is Malware?

Definition, goals, and impact of malicious software.

Lab 3: Malware Categories

Viruses, worms, trojans, spyware, adware, ransomware, rootkits.

Lab 4: Malware Kill Chain

Initial access → execution → persistence → command & control.

Lab 5: Infection Vectors

Email, web downloads, exploits, USB, supply chain attacks.

Lab 6: Trojans

Malware disguised as legitimate software.

Lab 7: Worms

Self-propagating malware without user interaction.

Lab 8: Spyware

Credential theft, keylogging, and surveillance malware.

Lab 9: Adware & PUPs

Annoyance software vs malicious intent.

Lab 10: Ransomware

Encryption, extortion, and recovery strategies.

Lab 11: Rootkits

Deep system compromise and stealth techniques.

Lab 12: Fileless Malware

Living off the land attacks using legitimate tools.

Lab 13: Persistence Mechanisms

Registry keys, services, scheduled tasks.

Lab 14: Command & Control (C2)

How malware communicates with attackers.

Lab 15: Data Exfiltration

How stolen data leaves a network.

Lab 16: Indicators of Compromise (IOCs)

Files, hashes, IPs, domains, behaviors.

Lab 17: Signature-Based Detection

Traditional antivirus scanning.

Lab 18: Behavior-Based Detection

EDR and anomaly detection.

Lab 19: Sandbox Analysis

Safely observing malware execution.

Lab 20: Memory Analysis

Detecting malware that never touches disk.

Lab 21: Incident Response Process

Detect → Contain → Eradicate → Recover.

Lab 22: Containment & Isolation

Stopping malware spread quickly.

Lab 23: Eradication & Recovery

System cleaning, reimaging, backups.

Lab 24: Prevention & Hardening

Patching, least privilege, application control.

Lab 25: Final Capstone – Malware Defense Strategy

Design a full enterprise malware prevention and response plan.

CTF{MALWARE_DEFENSE_COMPLETE}