top of page


How to install Azure CLI to Windows


Visit this site and install Azure CLI




After installation, close and reopen any active terminal window. Run the Azure CLI with the az command from either PowerShell or the Windows Command Prompt.



Now login to your Azure with Azure CLI


with command


AZ login

It will take you to one interactive window to login to your Azure account - use the email which is your primary email account for azure.


After Successful login you will get out put as follows




Now you can check your account details by using below command.


az account show

You will one Jason type structure. It means that you have successfully login


Steps to Deploy a Docker Container to Azure

Step 1: Create a Docker Container Locally

  1. Install Docker on your machine.

  2. Create a simple app (for example, Python Flask or Node.js).

  3. Create a Dockerfile:

# Example for Python Flask app
FROM python:3.11-slim
WORKDIR /app
COPY requirements.txt .
RUN pip install -r requirements.txt
COPY . .
EXPOSE 5000
CMD ["python", "app.py"]
  1. Build the image:

docker build -t myapp:1.0 .
  1. Test locally:

docker run -p 5000:5000 myapp:1.0

Step 2: Push Docker Image to Azure Container Registry (ACR)

  1. Search for “Container Registry”

    At the top search bar, type:

Container Registry

Click on Container Registries service.


Click + Create

You will see a Create button. Click it.



Fill the Basic Details

Field

What to select

Subscription

Azure for Students

Resource Group

Click Create new → name: myResourceGroup

Registry name

myacrstudent

Location

Central India (or nearest)




  1. Tag your image:


  1. Push image:


docker push myacrstudent.azurecr.io/myapp:1.0

Step 3: Deploy to Azure

Option 1: Azure Container Instances (ACI) — easiest for students

az container create \
  --resource-group myResourceGroup \
  --name mycontainer \
  --image myacrstudent.azurecr.io/myapp:1.0 \
  --registry-login-server myacrstudent.azurecr.io \
  --registry-username <ACR-username> \
  --registry-password <ACR-password> \
  --dns-name-label myappstudent \
  --ports 5000

Option 2: Azure App Service (Web App for Containers)

  • You can deploy your container directly as a Web App.

  • Azure App Service can pull directly from ACR.

  • Great for web apps without worrying about scaling manually.

Step 4: Access Your App

  • Once container is running, check logs:

az container logs --name mycontainer --resource-group myResourceGroup




 
 
 

PRACTICAL–1


Create Your First Website on Azure (Beginner Friendly)

This is the BEST first practical after setting up Azure for Students.


AIM

To create and publish a simple website on Azure using Azure App Service (Free Tier).


What You Will Learn


  1. How Azure works

  2. What is a Resource Group

  3. What is Azure App Service

  4. How to open a live website on the internet

  5. How to avoid credit usage


COST

₹0 / $0 (Free Tier)


STEP 1: Login to Azure Portal

  1. Open browser

  2. Go to 👉 https://portal.azure.com

  3. Login with your Azure for Students account


You should see the Azure dashboard


STEP 2: Create a Resource Group


  1. In the search bar (top), type:Resource groups

  2. Click Resource groups

  3. Click + Create



Fill the details:

  1. Subscription: Azure for Students

  2. Resource group name: rg-first-practical

  3. Region: Central India (or nearest)

  4. Click Review + Create

  5. Click Create


Resource group created


STEP 3: Create a Web App (Website)

  1. In the search bar, type:App Services

  2. Click App Services

  3. Click + Create

  4. Select Web App


STEP 4: Fill Web App Basic Details (IMPORTANT)

On the Basics tab, fill ONLY this:


  • Subscription: Azure for Students

  • Resource Group: rg-first-practical

  • Name: myfirstazureweb123(must be unique – change number if needed)

  • Publish: Code

  • Runtime stack: HTML

  • Operating System: Windows

  • Region: Central India


STEP 5: Choose FREE Hosting Plan (MOST IMPORTANT STEP)

Scroll down to Pricing Plan

  1. Click Change size

  2. Select F1 – Free

  3. Click Apply


Do NOT choose any paid plan

STEP 6: Create the Web App

  1. Click Review + Create

  2. Azure will validate

  3. Click Create

Wait 1–2 minutes


STEP 7: Open Your Live Website

After deployment completes:

  1. Click Go to resource

  2. At the top, click the URL(looks like https://myfirstazureweb123.azurewebsites.net)


Congratulations!Your first Azure website is LIVE on the internet STEP 8: Add Your Own



 
 
 

Malware analysis is a critical skill in cybersecurity, helping analysts understand how malicious software works, how it spreads, and how to defend against it. Whether you are a beginner, SOC analyst, or an aspiring reverse engineer, choosing the right tools at each stage of learning is essential.

In this article, we explore the Top 10 malware analysis tools, categorized by Static, Dynamic, and Hybrid analysis, and arranged from beginner to advanced level.




What Is Malware Analysis?

Malware analysis is the process of examining malicious software to:

  • Identify its behavior

  • Understand its functionality

  • Detect indicators of compromise (IOCs)

  • Improve detection and response strategies

There are three main types of malware analysis:

  • Static Analysis – Examining malware without executing it

  • Dynamic Analysis – Running malware in a controlled environment

  • Hybrid Analysis – Combining static and dynamic techniques

 

🔍 Static Malware Analysis Tools

(Safe analysis without executing malware)

1. VirusTotal (Beginner)

VirusTotal is an online service that scans files and URLs using multiple antivirus engines.

Key Features:

  • Hash and signature-based detection

  • Behavioral reports

  • Community intelligence

Best Use Case: Initial malware triage and reputation checks

 

2. PEStudio (Beginner)

PEStudio is a powerful static analysis tool for Windows executables.

Key Features:

  • Detects suspicious imports and APIs

  • Identifies packers and obfuscation

  • No execution required

Best Use Case: Quick inspection of PE files

 

3. Strings (Sysinternals / GNU Strings) (Intermediate)

The Strings utility extracts human-readable text from binary files.

Key Features:

  • Reveals URLs, IP addresses, commands, and registry paths

  • Lightweight and fast

Best Use Case: Identifying embedded indicators of compromise

 

4. Detect It Easy (DIE) (Intermediate)

Detect It Easy identifies compilers, packers, and file formats.

Key Features:

  • Detects obfuscation and encryption

  • Supports multiple platforms

Best Use Case: Pre-reversing analysis and packer detection

 

5. Ghidra (Advanced)

Ghidra is a full-featured reverse engineering framework developed by the NSA.

Key Features:

  • Disassembler and decompiler

  • Cross-platform support

  • Scriptable analysis

Best Use Case: Deep code-level malware analysis

 

⚙️ Dynamic Malware Analysis Tools

(Analyzing malware behavior during execution)

6. Any.Run (Beginner)

Any.Run is an interactive online malware sandbox.

Key Features:

  • Real-time malware execution

  • Visual process and network activity

  • No lab setup required

Best Use Case: Behavioral analysis without local risk

 

7. Process Monitor (ProcMon) (Intermediate)

Process Monitor from Sysinternals captures real-time system activity.

Key Features:

  • Tracks file system, registry, and process activity

  • Highly detailed event logging

Best Use Case: Observing malware impact on Windows OS

 

8. Wireshark (Intermediate)

Wireshark is a network protocol analyzer used to capture and analyze traffic.

Key Features:

  • Detects command-and-control (C2) traffic

  • Supports deep packet inspection

Best Use Case: Network-based malware behavior analysis

 

9. x64dbg (Advanced)

x64dbg is a powerful debugger for Windows binaries.

Key Features:

  • Runtime code analysis

  • Breakpoints and memory inspection

  • Anti-debugging bypass techniques

Best Use Case: Advanced malware debugging and unpacking

 

🔀 Hybrid Malware Analysis Tool

10. Cuckoo Sandbox (Advanced)

Cuckoo Sandbox is an automated malware analysis system combining static and dynamic techniques.

Key Features:

  • Automated execution and reporting

  • API, network, and memory analysis

  • Extensible and open-source

Best Use Case: Enterprise-level malware research and automation






 
 
 

© 2023 by newittrendzzz.com 

  • Facebook
  • Twitter
  • Instagram
bottom of page