Soumettre la recherche
Mettre en ligne
Malware Analysis Made Simple SecureWorld Expo Detroit
•
6 j'aime
•
2,595 vues
Titre amélioré par l'IA
Paul Melson
Suivre
"Malware Analysis Made Simple" from SecureWorld Expo Detroit, 11/05/2008
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 36
Recommandé
Threat hunting and achieving security maturity
Threat hunting and achieving security maturity
DNIF
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
Threat Modeling Using STRIDE
Threat Modeling Using STRIDE
Girindro Pringgo Digdo
APIsecure 2023 - Android Applications and API Hacking, Gabrielle Botbol
APIsecure 2023 - Android Applications and API Hacking, Gabrielle Botbol
apidays
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE - ATT&CKcon
Introduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
Arpan Raval
Bug Bounty 101
Bug Bounty 101
Shahee Mirza
Recommandé
Threat hunting and achieving security maturity
Threat hunting and achieving security maturity
DNIF
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
Threat Modeling Using STRIDE
Threat Modeling Using STRIDE
Girindro Pringgo Digdo
APIsecure 2023 - Android Applications and API Hacking, Gabrielle Botbol
APIsecure 2023 - Android Applications and API Hacking, Gabrielle Botbol
apidays
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE - ATT&CKcon
Introduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
Arpan Raval
Bug Bounty 101
Bug Bounty 101
Shahee Mirza
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
Basic Malware Analysis
Basic Malware Analysis
Albert Hui
Threat Modelling
Threat Modelling
n|u - The Open Security Community
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
Touhami Kasbaoui
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
Threat Modeling And Analysis
Threat Modeling And Analysis
Lalit Kale
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
Sergey Soldatov
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
Jorge Orchilles
A Threat Hunter Himself
A Threat Hunter Himself
Teymur Kheirkhabarov
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
Ross Wolf
Purple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMCon
Jorge Orchilles
Android application penetration testing
Android application penetration testing
Roshan Kumar Gami
Penetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
Penetration Testing Basics
Penetration Testing Basics
Rick Wanner
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
MITRE - ATT&CKcon
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Romansh Yadav
'Malware Analysis' by PP Singh
'Malware Analysis' by PP Singh
Bipin Upadhyay
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
Contenu connexe
Tendances
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
Basic Malware Analysis
Basic Malware Analysis
Albert Hui
Threat Modelling
Threat Modelling
n|u - The Open Security Community
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
Touhami Kasbaoui
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
OWASP Delhi
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
Threat Modeling And Analysis
Threat Modeling And Analysis
Lalit Kale
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
Sergey Soldatov
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
Jorge Orchilles
A Threat Hunter Himself
A Threat Hunter Himself
Teymur Kheirkhabarov
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
Ross Wolf
Purple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMCon
Jorge Orchilles
Android application penetration testing
Android application penetration testing
Roshan Kumar Gami
Penetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
Penetration Testing Basics
Penetration Testing Basics
Rick Wanner
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
MITRE - ATT&CKcon
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Romansh Yadav
Tendances
(20)
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
Basic Malware Analysis
Basic Malware Analysis
Threat Modelling
Threat Modelling
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
Threat Modeling And Analysis
Threat Modeling And Analysis
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
A Threat Hunter Himself
A Threat Hunter Himself
Fantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
Purple Team Exercises - GRIMMCon
Purple Team Exercises - GRIMMCon
Android application penetration testing
Android application penetration testing
Penetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
Penetration Testing Basics
Penetration Testing Basics
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
Mobile security part 1(Android Apps Pentesting)- Romansh yadav
En vedette
'Malware Analysis' by PP Singh
'Malware Analysis' by PP Singh
Bipin Upadhyay
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
PyTriage: A malware analysis framework
PyTriage: A malware analysis framework
Yashin Mehaboobe
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
Sam Bowne
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Sam Bowne
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
CNIT 126 4: A Crash Course in x86 Disassembly
CNIT 126 4: A Crash Course in x86 Disassembly
Sam Bowne
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
Sam Bowne
CNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection Mechanisms
Sam Bowne
CNIT 126 6: Recognizing C Code Constructs in Assembly
CNIT 126 6: Recognizing C Code Constructs in Assembly
Sam Bowne
CNIT 126 8: Debugging
CNIT 126 8: Debugging
Sam Bowne
CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro
Sam Bowne
Practical Malware Analysis Ch12
Practical Malware Analysis Ch12
Sam Bowne
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Sam Bowne
Ch 13: Network Protection Systems
Ch 13: Network Protection Systems
Sam Bowne
Cybersecurity and The Board
Cybersecurity and The Board
Paul Melson
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware Behavior
Sam Bowne
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Sam Bowne
Practical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-Disassembly
Sam Bowne
Client side attacks using PowerShell
Client side attacks using PowerShell
Nikhil Mittal
En vedette
(20)
'Malware Analysis' by PP Singh
'Malware Analysis' by PP Singh
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
PyTriage: A malware analysis framework
PyTriage: A malware analysis framework
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
CNIT 126 4: A Crash Course in x86 Disassembly
CNIT 126 4: A Crash Course in x86 Disassembly
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection Mechanisms
CNIT 126 6: Recognizing C Code Constructs in Assembly
CNIT 126 6: Recognizing C Code Constructs in Assembly
CNIT 126 8: Debugging
CNIT 126 8: Debugging
CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro
Practical Malware Analysis Ch12
Practical Malware Analysis Ch12
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Ch 13: Network Protection Systems
Ch 13: Network Protection Systems
Cybersecurity and The Board
Cybersecurity and The Board
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-Disassembly
Client side attacks using PowerShell
Client side attacks using PowerShell
Similaire à Malware Analysis Made Simple SecureWorld Expo Detroit
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Paul Melson
Security Handbook
Security Handbook
Anthony Hasse
Hacking and its Defence
Hacking and its Defence
Greater Noida Institute Of Technology
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Natraj G
Cybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
TechBiz Forense Digital
DevSecCon Talk: An experiment in agile Threat Modelling
DevSecCon Talk: An experiment in agile Threat Modelling
zeroXten
An experiment in agile threat modelling
An experiment in agile threat modelling
DevSecCon
2600 av evasion_deuce
2600 av evasion_deuce
Db Cooper
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
pauline234567
Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia
Intro2 malwareanalysisshort
Intro2 malwareanalysisshort
Vincent Ohprecio
Modern Malware and Threats
Modern Malware and Threats
MarketingArrowECS_CZ
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
Workshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
Modern malware and threats
Modern malware and threats
Martin Holovský
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk
Hacking
Hacking
rameswara reddy venkat
Hacking
Hacking
Roshan Chaudhary
Security by Weston Hecker
Security by Weston Hecker
EC-Council
Similaire à Malware Analysis Made Simple SecureWorld Expo Detroit
(20)
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Security Handbook
Security Handbook
Hacking and its Defence
Hacking and its Defence
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Cybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
DevSecCon Talk: An experiment in agile Threat Modelling
DevSecCon Talk: An experiment in agile Threat Modelling
An experiment in agile threat modelling
An experiment in agile threat modelling
2600 av evasion_deuce
2600 av evasion_deuce
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004
Intro2 malwareanalysisshort
Intro2 malwareanalysisshort
Modern Malware and Threats
Modern Malware and Threats
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
Workshop on BackTrack live CD
Workshop on BackTrack live CD
Modern malware and threats
Modern malware and threats
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Hacking
Hacking
Hacking
Hacking
Security by Weston Hecker
Security by Weston Hecker
Dernier
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
Dernier
(20)
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Malware Analysis Made Simple SecureWorld Expo Detroit
1.
Malware Analysis Made
Simple SecureWorld Expo Detroit Wednesday, November 5, 2008 Paul Melson
2.
Security Incident Response
3.
4.
5.
Why Do Malware
Analysis In-House?
6.
7.
Malware Trends
8.
9.
10.
11.
Detection
12.
Anatomy of a
Drive-By Download Dropper Malware Servers More Malware JScript Exploit
13.
14.
15.
16.
17.
18.
Analysis
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
Building Toolkits
30.
31.
32.
Prevention & Recovery
33.
34.
35.
36.
Q & A
Session