Please use this identifier to cite or link to this item: http://hdl.handle.net/2445/182840
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorRoca Cánovas, Raúl-
dc.contributor.authorAgruña Álvarez, Sergio-
dc.date.accessioned2022-02-01T08:49:53Z-
dc.date.available2022-02-01T08:49:53Z-
dc.date.issued2021-01-22-
dc.identifier.urihttp://hdl.handle.net/2445/182840-
dc.descriptionTreballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2021, Director: Raúl Roca Cánovasca
dc.description.abstract[en] Today cybersecurity is a concept in progress in this society, given the state of pandemic due to CoVid-19 many companies have had to adapt to the new normal by increasing the number of people teleworking, due to the rush and lack of guidance , 2020 has become a goldmine for cybercriminals. This paper presents the topic of forensic analysis of malware on a Windows 10 system. First, a small introduction is made and the reason for the selection of this work, followed by an explanation about the rise of cyber attacks today, statistics on the use of computers in families and / or companies and why we are currently in a time where having good security in our system is of vital importance to avoid catastrophes. The main intention of this work will be exposed, which is to perform a mock forensic analysis on an infected computer. The different phases of this are analyzed following international regulations and a short explanation of the different types of malware that currently exist and how they work is also exposed. Finally, we will do a practical job infecting a virtual machine with a Windows 10 snapshot using a backdoor malware called Gcat, we will analyze how it works, how we can infect the victim and what options this malware has once infected, we will analyze what the attack is backdoor and how it works and finally we will carry out a forensic analysis doing all the real tests and making a final report explaining what evidence we have found on the infected computer.ca
dc.format.extent79 p.-
dc.format.mimetypeapplication/pdf-
dc.language.isospaca
dc.rightsmemòria: cc-nc-nd (c) Sergio Agruña Álvarez, 2021-
dc.rightscodi: GPL (c) Sergio Agruña Álvarez, 2021-
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/-
dc.rights.urihttp://www.gnu.org/licenses/gpl-3.0.ca.html*
dc.sourceTreballs Finals de Grau (TFG) - Enginyeria Informàtica-
dc.subject.classificationSeguretat informàticaca
dc.subject.classificationDelictes informàticsca
dc.subject.classificationProgramarica
dc.subject.classificationTreballs de fi de grauca
dc.subject.classificationCriminalísticaca
dc.subject.classificationSeguretat de les xarxes d'ordinadorsca
dc.subject.otherComputer securityen
dc.subject.otherComputer crimesen
dc.subject.otherComputer softwareen
dc.subject.otherForensic sciencesen
dc.subject.otherComputer network securityen
dc.subject.otherBachelor's thesesen
dc.titleAnálisis forense de una infección por malwareca
dc.typeinfo:eu-repo/semantics/bachelorThesisca
dc.rights.accessRightsinfo:eu-repo/semantics/openAccessca
Appears in Collections:Programari - Treballs de l'alumnat
Treballs Finals de Grau (TFG) - Enginyeria Informàtica

Files in This Item:
File Description SizeFormat 
tfg_sergio_agruña_alvarez.pdfMemòria4.63 MBAdobe PDFView/Open
codi.rarCodi font2.35 GBUnknownView/Open


This item is licensed under a Creative Commons License Creative Commons