Advanced malware analysis training session1 detection and removal of malwares

Advanced malware analysis training session1 detection and removal of malwares
Disclaimer
The Content, Demonstration, Source Code and Programs presented here is "AS IS" without
any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are
solely of the trainer’s only and nothing to do with the company or the organization in which
the trainer is currently working.
However in no circumstances neither the Trainer nor Cysinfo is responsible for any damage or
loss caused due to use or misuse of the information presented here.
Acknowledgement
 Special thanks to Null community for their extended support and co-operation.
 Special thanks to ThoughtWorks for the beautiful venue.
 Thanks to all the trainers who have devoted their precious time and countless hours to make it
happen.
Advanced Malware Analysis Training
This presentation is part of our Advanced Malware Analysis Training program. Currently it
is delivered only during our local meets for FREE of cost.
For
Who Are We?
Nagareshwar
 Founder of SecurityXploded
 Reversing, Malware Analysis, Crypto, Secure Coding
 Twitter: @tnagareshwar
Monnappa
 Info Security Investigator @ Cisco
 Member of Cysinfo
 Reverse Engineering, Malware Analysis, Memory Forensics
 Twitter: @monnappa22
Advanced malware analysis training session1 detection and removal of malwares
 What is Virus/Malware/Worm
 Symptoms of Infection
 Agent in Action
 Last Resort
 Anti-Malware Tips
 Malware: Software written for malicious purposes
- destroy data, steal money, annoy users
 Virus: Malware which requires human intervention to spread
- require user to click on the exe, open a document or visit a website
 Worm: Malware which can spread automatically
- automatically infect other systems in the network
- spreads through plug & play devices
 Unusual Behaviour in Applications
 System Slowdown
 (Suddenly) Laptop Getting Heated Heavily
 Password Change/Reset Emails for your Bank or Online Accounts
 Surprise Financial Transactions on your Credit Cards 
 Full Anti-virus Scan (manual)
- detect known malwares if any
 Rootkit Scan
- GMER, SpyDLLRemover (helps in removal of malware DLLs)
 Scan the Infected or Suspicious file with VirusTotal
- Get the name of virus/malware family
- Use VirusTotal Scanner Tool for quick scan
 Check with AV sites like McAfee, Symantec for the detected Malware
- to understand infection details or for any removal steps
 BHO Scan (System Slowdown)
- Run SpyBHORemover and disable unusable BHOs
 Delete Locked/Hidden/Protected Malware Files
- Use GMER to delete Hidden Files/Registry Keys
- Boot with BackTrack, mount your drives and delete the files/registry keys
 Change Passwords of Bank & other important accounts
- Facebook, Google, Twitter, PayPal etc.
Advanced malware analysis training session1 detection and removal of malwares
Advanced malware analysis training session1 detection and removal of malwares
Advanced malware analysis training session1 detection and removal of malwares
Advanced malware analysis training session1 detection and removal of malwares
Advanced malware analysis training session1 detection and removal of malwares
In case of full system or widespread infections,
 System Restore to ‘Right Restore Point’
- look at the dates of infected files and it should give you right date to restore from
 Format and Re-install OS
- clean-up other drives if necessary
 Scan other systems/devices in your Network
- Your laptops, office systems or friends system may be infected as well
 Never Trust your AntiVirus for Full Protection
- It cannot detect advanced virus especially rootkit oriented ones,
- Smart virus can disable AV auto protection silently giving you false sense of security
 Always Scan any EXE with VirusTotal
- scan files downloaded from Internet and even files sent by close friends
- Use VirusTotal Scanner for quick scan
 Disable AutoRun
- most malwares use this mechanism spread very effectively
- prevent getting infected through USB stick and stop it from spreading
 Keep tab on your Startup programs
- Use HijackThis or AutoRuns from SysInternals
 Monitor Worms coming through Network
- Use NetShareMonitor
 Backup your Critical Files Periodically
- One who Laughs last is the one who had the backup :)
Advanced malware analysis training session1 detection and removal of malwares
 Detection and Removal
 Persistent Mechanism
 Demo 1
 Demo 2
 Demo 3
 Demo 4
1) Isolate the system from the rest of the network
2) Look for suspicious file, process, network and registry values
3) Identify the file generating the suspicious activity
4) Isolate the suspicious file
5) verify if the file is malicious
6) Identify the persistence mechanism
7) Break its persistence mechanism
8) Delete the malicious files from the system
9) monitor for suspicious activities (repeat step 2 to step 8)
Below are some of the persistent mechanism used by malware:
1) Run Registry key
2) Appinit_DLL’s
3) WinLogon Notify
4) Runs as Service
5) Service DLL
6) BHO
Advanced malware analysis training session1 detection and removal of malwares
www.SecurityXploded.com
Packet capture shows suspicious activity from 192.168.1.100
www.SecurityXploded.com
Process explorer shows suspicious process on192.168.1.100
www.SecurityXploded.com
Registers the malicious executable in the “Run” registry key, to survive reboot
www.SecurityXploded.com
Suspicious file was confirmed to be malicious
www.SecurityXploded.com
Deleting the registry value removes the persistence mechanism used by the malware
www.SecurityXploded.com
Deleting the malicious file to remove the malware from the system
Advanced malware analysis training session1 detection and removal of malwares
www.SecurityXploded.com
Packet capture shows suspicious activity from 192.168.1.100
www.SecurityXploded.com
Process explorer shows suspicious process on192.168.1.100
www.SecurityXploded.com
Malware runs as service which is set to auto-start
www.SecurityXploded.com
Suspicious file was confirmed to be malicious
www.SecurityXploded.com
Deleting the registry value removes the persistence mechanism used by the malware
www.SecurityXploded.com
Deleting the malicious file to remove the malware from the system
Advanced malware analysis training session1 detection and removal of malwares
www.SecurityXploded.com
Packet capture shows suspicious activity from 192.168.1.100
www.SecurityXploded.com
Below screenshot shows svchost.exe (pid 1052) making connections on port 80
www.SecurityXploded.com
Malware installs a service DLL under the “netsvcs” svchost group
www.SecurityXploded.com
Suspicious file was confirmed to be malicious
www.SecurityXploded.com
Deleting the registry key removes the persistence mechanism used by the malware
www.SecurityXploded.com
Deleting the malicious file to remove the malware from the system
Advanced malware analysis training session1 detection and removal of malwares
www.SecurityXploded.com
Packet capture shows suspicious activity from 192.168.1.100
www.SecurityXploded.com
Shows iexplore.exe making connections on port 80 (even though iexplore.exe was not run manually)
www.SecurityXploded.com
Malware installs Appinit DLL which loads the DLL into all the process which loads user32.dll
www.SecurityXploded.com
Malware hooks to the winlogon event
www.SecurityXploded.com
Suspicious files were confirmed to be malicious
www.SecurityXploded.com
Deleting the registry key removes the persistence mechanism used by the malware
www.SecurityXploded.com
Deleting both the malicious files to remove the malware from the system
Thank You !
1 sur 53

Recommandé

Reversing malware analysis training part1 lab setup guide par
Reversing malware analysis training part1 lab setup guideReversing malware analysis training part1 lab setup guide
Reversing malware analysis training part1 lab setup guideCysinfo Cyber Security Community
2.7K vues16 diapositives
Watering hole attacks case study analysis par
Watering hole attacks case study analysisWatering hole attacks case study analysis
Watering hole attacks case study analysisCysinfo Cyber Security Community
745 vues22 diapositives
Advanced malware analysis training session10 part1 par
Advanced malware analysis training session10 part1Advanced malware analysis training session10 part1
Advanced malware analysis training session10 part1Cysinfo Cyber Security Community
674 vues27 diapositives
Return address par
Return addressReturn address
Return addressCysinfo Cyber Security Community
183 vues18 diapositives
Reversing malware analysis training part7 unpackingupx par
Reversing malware analysis training part7 unpackingupxReversing malware analysis training part7 unpackingupx
Reversing malware analysis training part7 unpackingupxCysinfo Cyber Security Community
702 vues23 diapositives
Reversing malware analysis training part10 exploit development basics par
Reversing malware analysis training part10 exploit development basicsReversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basicsCysinfo Cyber Security Community
585 vues21 diapositives

Contenu connexe

Tendances

Advanced malware analysis training session8 introduction to android par
Advanced malware analysis training session8 introduction to androidAdvanced malware analysis training session8 introduction to android
Advanced malware analysis training session8 introduction to androidCysinfo Cyber Security Community
1.5K vues18 diapositives
Reverse engineering malware par
Reverse engineering malwareReverse engineering malware
Reverse engineering malwareCysinfo Cyber Security Community
540 vues33 diapositives
Advanced malware analysis training session 7 malware memory forensics par
Advanced malware analysis training session 7 malware memory forensicsAdvanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensicsCysinfo Cyber Security Community
777 vues42 diapositives
Basic malware analysis par
Basic malware analysis Basic malware analysis
Basic malware analysis Cysinfo Cyber Security Community
511 vues33 diapositives
Advanced malwareanalysis training session2 botnet analysis part1 par
Advanced malwareanalysis training session2 botnet analysis part1Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Cysinfo Cyber Security Community
908 vues30 diapositives
Advanced malware analysis training session11 part2 dissecting the heart beat ... par
Advanced malware analysis training session11 part2 dissecting the heart beat ...Advanced malware analysis training session11 part2 dissecting the heart beat ...
Advanced malware analysis training session11 part2 dissecting the heart beat ...Cysinfo Cyber Security Community
1K vues43 diapositives

Tendances(20)

Advanced Malware Analysis Training Session 7 - Malware Memory Forensics par securityxploded
Advanced Malware Analysis Training Session 7  - Malware Memory ForensicsAdvanced Malware Analysis Training Session 7  - Malware Memory Forensics
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
securityxploded13.4K vues
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares par securityxploded
Advanced Malware Analysis Training Session 1 - Detection and Removal of MalwaresAdvanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
securityxploded20.5K vues
Defeating public exploit protections (EMET v5.2 and more) par securityxploded
Defeating public exploit protections (EMET v5.2 and more)Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)
securityxploded1.2K vues
Hunting Ghost RAT Using Memory Forensics par securityxploded
Hunting Ghost RAT Using Memory ForensicsHunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory Forensics
securityxploded2.5K vues
Hunting Rootkit From the Dark Corners Of Memory par securityxploded
Hunting Rootkit From the Dark Corners Of MemoryHunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of Memory
securityxploded2.9K vues
Reversing & malware analysis training part 9 advanced malware analysis par Abdulrahman Bassam
Reversing & malware analysis training part 9   advanced malware analysisReversing & malware analysis training part 9   advanced malware analysis
Reversing & malware analysis training part 9 advanced malware analysis
Reversing and Decrypting the Communications of APT Malware (Etumbot) par securityxploded
Reversing and Decrypting the Communications of APT Malware (Etumbot)Reversing and Decrypting the Communications of APT Malware (Etumbot)
Reversing and Decrypting the Communications of APT Malware (Etumbot)
securityxploded2.7K vues

En vedette

Advanced malware analysis training session5 reversing automation par
Advanced malware analysis training session5 reversing automationAdvanced malware analysis training session5 reversing automation
Advanced malware analysis training session5 reversing automationCysinfo Cyber Security Community
463 vues19 diapositives
Reversing malware analysis training part3 windows pefile formatbasics par
Reversing malware analysis training part3 windows pefile formatbasicsReversing malware analysis training part3 windows pefile formatbasics
Reversing malware analysis training part3 windows pefile formatbasicsCysinfo Cyber Security Community
1.1K vues34 diapositives
Reversing malware analysis training part4 assembly programming basics par
Reversing malware analysis training part4 assembly programming basicsReversing malware analysis training part4 assembly programming basics
Reversing malware analysis training part4 assembly programming basicsCysinfo Cyber Security Community
780 vues34 diapositives
Advanced malware analysis training session4 anti-analysis techniques par
Advanced malware analysis training session4 anti-analysis techniquesAdvanced malware analysis training session4 anti-analysis techniques
Advanced malware analysis training session4 anti-analysis techniquesCysinfo Cyber Security Community
980 vues27 diapositives
Reversing malware analysis training part6 practical reversing par
Reversing malware analysis training part6 practical reversingReversing malware analysis training part6 practical reversing
Reversing malware analysis training part6 practical reversingCysinfo Cyber Security Community
868 vues20 diapositives
Introduction to Binary Exploitation par
Introduction to Binary Exploitation	Introduction to Binary Exploitation
Introduction to Binary Exploitation Cysinfo Cyber Security Community
1.2K vues30 diapositives

En vedette(13)

Similaire à Advanced malware analysis training session1 detection and removal of malwares

Advanced Malware Analysis Training - Detection and Removal of Malwares par
Advanced Malware Analysis Training - Detection and Removal of MalwaresAdvanced Malware Analysis Training - Detection and Removal of Malwares
Advanced Malware Analysis Training - Detection and Removal of Malwaresn|u - The Open Security Community
1.1K vues55 diapositives
Module 5.pdf par
Module 5.pdfModule 5.pdf
Module 5.pdfSitamarhi Institute of Technology
8 vues8 diapositives
Module 5.Malware par
Module 5.MalwareModule 5.Malware
Module 5.MalwareSitamarhi Institute of Technology
16 vues8 diapositives
Reversing & malware analysis training part 8 malware memory forensics par
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensicsAbdulrahman Bassam
1K vues27 diapositives
Virus and types of antivirus par
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
720 vues27 diapositives
Types of malicious software and remedies par
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
2.8K vues24 diapositives

Similaire à Advanced malware analysis training session1 detection and removal of malwares(20)

Reversing & malware analysis training part 8 malware memory forensics par Abdulrahman Bassam
Reversing & malware analysis training part 8   malware memory forensicsReversing & malware analysis training part 8   malware memory forensics
Reversing & malware analysis training part 8 malware memory forensics
Types of malicious software and remedies par Manish Kumar
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar2.8K vues
Security protection par ARVINDR37
Security protectionSecurity protection
Security protection
ARVINDR3790 vues
so big 22 par cainem
so big 22so big 22
so big 22
cainem208 vues
so big par cainem
so bigso big
so big
cainem264 vues
so big ppt par cainem
so big pptso big ppt
so big ppt
cainem326 vues
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation par Lucy Denver
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
Lucy Denver209 vues

Plus de Cysinfo Cyber Security Community

Understanding Malware Persistence Techniques by Monnappa K A par
Understanding Malware Persistence Techniques by Monnappa K AUnderstanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K ACysinfo Cyber Security Community
4.1K vues43 diapositives
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi par
Understanding & analyzing obfuscated malicious web scripts by Vikram KharviUnderstanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram KharviCysinfo Cyber Security Community
575 vues21 diapositives
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK par
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TKGetting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TKCysinfo Cyber Security Community
630 vues26 diapositives
Emerging Trends in Cybersecurity by Amar Prusty par
Emerging Trends in Cybersecurity by Amar PrustyEmerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar PrustyCysinfo Cyber Security Community
580 vues93 diapositives
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai par
A look into the sanitizer family (ASAN & UBSAN) by Akul PillaiA look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul PillaiCysinfo Cyber Security Community
1.5K vues30 diapositives
Closer look at PHP Unserialization by Ashwin Shenoi par
Closer look at PHP Unserialization by Ashwin ShenoiCloser look at PHP Unserialization by Ashwin Shenoi
Closer look at PHP Unserialization by Ashwin ShenoiCysinfo Cyber Security Community
4.2K vues31 diapositives

Plus de Cysinfo Cyber Security Community(20)

Dernier

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue par
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
203 vues54 diapositives
Ransomware is Knocking your Door_Final.pdf par
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
96 vues46 diapositives
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... par
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
90 vues52 diapositives
"Package management in monorepos", Zoltan Kochan par
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan KochanFwdays
33 vues18 diapositives
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... par
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
166 vues28 diapositives
"Node.js Development in 2024: trends and tools", Nikita Galkin par
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin Fwdays
32 vues38 diapositives

Dernier(20)

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue par ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue203 vues
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... par The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
"Package management in monorepos", Zoltan Kochan par Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays33 vues
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... par ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue166 vues
"Node.js Development in 2024: trends and tools", Nikita Galkin par Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays32 vues
"Running students' code in isolation. The hard way", Yurii Holiuk par Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 vues
NTGapps NTG LowCode Platform par Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu423 vues
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... par BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 vues
The Power of Heat Decarbonisation Plans in the Built Environment par IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE79 vues
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue par ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue263 vues
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online par ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue221 vues
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue par ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue138 vues
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... par ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue194 vues
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... par Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro34 vues
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... par Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... par ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue180 vues
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... par ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue106 vues

Advanced malware analysis training session1 detection and removal of malwares