Malware screencast 3/5 – Different types of available malware simulation templates – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template.  Let’s have a look on these 5 videos:
  1. Setting up a malware testing toolkit simulation.
  2. Executing a malware simulation with LUCY. A harmless vulnerability scan is run.
  3. This post: Which types of malware simulation templates are available in LUCY?
  4. Setting up a ransomware attack simulation (harmless).
  5. How the simulations are reported: An example of a vulnerability scan report.

All screencasts can be seen here: Create an run malware  simulations

This short 5 Min. screencast shows all the different types of Malware Simulations provided by LUCY 3.0. You can choose out of a hand of different scenario templates containing a configurable and harmless trojan.  The screencast has been made with LUCY 3.0 so there may be differences in future versions, but standard mechanisms will remain the same.

There are several types of malware simulations available in LUCY. Create a new scenario based on a ‘technical malware simulation’ template. Then you can choose out of the following malware simulation behaviours:
  • Console Post (Predefined, harmless commands are executed on the target system and checked what the results are)
  • Recent Documents (Filenames of eecently used documents are gathered)
  • Console outlook (trying to access Outlook)
  • Screen recorder
  • Console interactive (This is a feature for penetration testers. A reverse shell is opened and the system administrator gets realtime access to the remote system)
  • Malware Testing Toolkit (This is a fully customizeable, vulnerability scanner of the system. Please refer to the other videos in this article)
  • Macros (Droppers. Due to security reasons,  only LUCY own dropper functionality can be used. You have the choice between Java or Word macros.)
  • Keylogger (keystrokes are logged.)
  • Microphone recorder

All screencasts can be seen here: Create an run malware  simulations