Malware screencast 2/5 – Executing a malware simulation with LUCY. A harmless vulnerability scan is run.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template.  Let’s have a look on these 5 videos:
  1. Setting up a malware testing toolkit simulation.
  2. Executing a malware simulation with LUCY. A harmless vulnerability scan is run.
  3. Which types of malware simulation templates are available in LUCY?
  4. Setting up a ransomware attack simulation (harmless).
  5. How the simulations are reported: An example of a vulnerability scan report.

All screencasts can be seen here: Create an run malware  simulations

A 6 Minute screencast shows how the malware simulation is downloaded and run on a PC. The .exe file is also known as LHFC (Low Hanging Fruit Collector). It can be configured within LUCY but when it’s downloaded on the PC you just can switch on/off the different check groups, a customization is not possible anymore.
Executing the malware simulation – the steps:
  1. As a recipient, yo received a message in your inbox with the link to the landing page for downloading the malware testing toolkit. Please click on the link in the mail and you are directed on the landing page.
  2. You are now on the landing page. Download the zip-file to your computer and extract it. It’s good to extract the file in a dedicated folder.
  3. Execute the file – the malware testing toolkit- by double clicking the file. If a Windows Defender Warning pops out for example, please proceed anyway. It’s good when such a tool warns you, but in this case you can continue with your work, LUCYs malware simulation toolkit is harmless.
  4. The GUI of the malware testing toolkit should be visible now (If not, please check if you checked the parameter ‘Show GUI’ = ‘on’). If you want to, you can disable/enable predefined malware simulation routines, but you can’t configure them anymore.
  5. Push the ‘start’ button. The malware simulation starts. You can see realtime if every predefined test fails or is successful (a successfull test is generally a identified vulnerability). Wait until all tests are finished. Depending on the configuration more than 50 tests are executed and more than 10 minutes are needed to run all malware simulation tests. So please wait until the scan has finished.
  6. After the scan has completed its work, you see the results of the scan, just scroll up to see all the checks which have been done.
  7. When you push the ‘send’ button: The data is send back to the LUCY server and saved on the server for analysis by the system administrator.
  8. When you push the ‘save’ button: A report is generated and stored locally on your computer, it can be viewed with a regular web browser.

All screencasts can be seen here: Create an run malware  simulations