<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I test ransamware myself ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-test-ransamware-myself/m-p/287390#M76710</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/64415"&gt;@awawa100&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The firewall itself can only prevent you from downloading the file in the first place, so testing this won't actually require you to run anything. Ransomware samples are prevelant; try to download some and if it actually downloads successfully.&lt;/P&gt;&lt;P&gt;The firewall should really only be one of the layers involved in your defence, and I wouldn't rely on it actually stopping users from downloading ransomware. If you are fully decrypting the traffic it should be able to catch files already identified by WildFire, but that only goes so far. I would recommend that you ensure you have something like Traps or CrowdStrike installed on your endpoints, as they both actually serve to stop the ransomware from actually locking down the system or spreading within your network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When it comes to actual testing you don't do malware testing on just any machine. You want to make it so that the machine you are using for testing is actually isolated from anything else on your network if it needs any network connectivity at all; and I would generally recommend utilizing a sandboxed VM on an isolated host.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Sep 2019 14:55:15 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2019-09-09T14:55:15Z</dc:date>
    <item>
      <title>How do I test ransamware myself ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-test-ransamware-myself/m-p/287291#M76704</link>
      <description>&lt;DIV class="text-wrap tlid-copy-target"&gt;&lt;DIV class="result-shield-container tlid-copy-target"&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN class=""&gt;Hello&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt; &lt;SPAN&gt;everyone&lt;/SPAN&gt; &lt;SPAN&gt;of the&lt;/SPAN&gt; &lt;SPAN&gt;specialist&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I plan to&lt;/SPAN&gt; &lt;SPAN&gt;settings for&lt;/SPAN&gt; &lt;SPAN&gt;wannacry&lt;/SPAN&gt; &lt;SPAN&gt;in the&lt;/SPAN&gt; &lt;SPAN&gt;Pan-OS 8.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;I want to check in advance that the settings will work&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;But I can't have a real wannacry on my PC&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;So I'm worried about how to prepare a fake wannacry&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Do you have a good idea&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="tlid-result-transliteration-container result-transliteration-container transliteration-container"&gt;&lt;DIV class="tlid-transliteration-content transliteration-content full"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="tlid-transliteration-content transliteration-content full"&gt;～～～～japanese&lt;/DIV&gt;&lt;DIV class="tlid-transliteration-content transliteration-content full"&gt;&lt;P&gt;こんにちは、スペシャリストの皆さん&lt;/P&gt;&lt;P&gt;私はPan-OS 8.1でwannacryに対する設定をする予定です&lt;/P&gt;&lt;P&gt;その設定が間違いなく動作するかを事前に確認したいです&lt;/P&gt;&lt;P&gt;ですが、私が本物のwannacryをPCに用意するわけにはいかないです&lt;/P&gt;&lt;P&gt;そこで、偽のwannacryをどうやって用意するかを悩んでいます&lt;/P&gt;&lt;P&gt;良いアイデアはありますか&lt;/P&gt;&lt;P&gt;ありがとう&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 09 Sep 2019 09:00:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-test-ransamware-myself/m-p/287291#M76704</guid>
      <dc:creator>awawa100</dc:creator>
      <dc:date>2019-09-09T09:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: How do I test ransamware myself ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-test-ransamware-myself/m-p/287390#M76710</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/64415"&gt;@awawa100&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The firewall itself can only prevent you from downloading the file in the first place, so testing this won't actually require you to run anything. Ransomware samples are prevelant; try to download some and if it actually downloads successfully.&lt;/P&gt;&lt;P&gt;The firewall should really only be one of the layers involved in your defence, and I wouldn't rely on it actually stopping users from downloading ransomware. If you are fully decrypting the traffic it should be able to catch files already identified by WildFire, but that only goes so far. I would recommend that you ensure you have something like Traps or CrowdStrike installed on your endpoints, as they both actually serve to stop the ransomware from actually locking down the system or spreading within your network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When it comes to actual testing you don't do malware testing on just any machine. You want to make it so that the machine you are using for testing is actually isolated from anything else on your network if it needs any network connectivity at all; and I would generally recommend utilizing a sandboxed VM on an isolated host.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 14:55:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-test-ransamware-myself/m-p/287390#M76710</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-09-09T14:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: How do I test ransamware myself ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-test-ransamware-myself/m-p/287905#M76773</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Please listen to what BPry is saying. Always use a test machine and make sure its segregated from the rest of the network. If you subscribe to wildfire, you can test it as they have a test file to use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://wildfire.paloaltonetworks.com/wildfire/account" target="_blank"&gt;https://wildfire.paloaltonetworks.com/wildfire/account&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 16:45:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-test-ransamware-myself/m-p/287905#M76773</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-09-11T16:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: How do I test ransamware myself ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-test-ransamware-myself/m-p/289756#M77025</link>
      <description>&lt;DIV class="text-wrap tlid-copy-target"&gt;&lt;DIV class="result-shield-container tlid-copy-target"&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN class=""&gt;Experts&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;Thanks for some advice&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;We chose metasploit as a penetration tool&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;I was able to see the threat alert&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you everyone&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="tlid-result-transliteration-container result-transliteration-container transliteration-container"&gt;&lt;DIV class="tlid-transliteration-content transliteration-content full"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="tlid-transliteration-content transliteration-content full"&gt;日本語～～～～～&lt;/DIV&gt;&lt;DIV class="tlid-transliteration-content transliteration-content full"&gt;&lt;P&gt;エキスパートの皆さん&lt;BR /&gt;いくつかのアドバイスをありがとう&lt;/P&gt;&lt;P&gt;ぺネストレーションのツールとして、metasploitを選びました&lt;/P&gt;&lt;P&gt;脅威のアラートを確認することができました&lt;/P&gt;&lt;P&gt;みなさん、ありがとうございました&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 24 Sep 2019 09:23:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-test-ransamware-myself/m-p/289756#M77025</guid>
      <dc:creator>awawa100</dc:creator>
      <dc:date>2019-09-24T09:23:05Z</dc:date>
    </item>
  </channel>
</rss>

