Malware Analysis Made Simple

Paul Melson
Paul MelsonIS Director, Information Security Risk & Compliance à Spectrum Health
Malware Analysis Made Simple SecureWorld Expo Detroit Wednesday, November 5, 2008 Paul Melson
Security Incident Response
Why Not Focus On Prevention? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
You’re Probably Required To ,[object Object],[object Object],[object Object],[object Object],[object Object]
Why Do Malware Analysis In-House?
Malware is Number 1!  Yay! ,[object Object],[object Object],[object Object],[object Object],[object Object]
Malware Trends
Firewalls & Antivirus Have Lost ,[object Object],[object Object],[object Object]
Malware is Adapting Quickly ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ But it’s just spyware, right?” ,[object Object],[object Object],[object Object],[object Object],[object Object]
Detection
Anatomy of a Drive-By Download Dropper Malware Servers More Malware JScript Exploit
Log Files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
IDS/IPS Alerts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Snort Rules ,[object Object],[object Object],[object Object],[object Object]
Antivirus?! Yes, Antivirus! ,[object Object],[object Object]
Analysis
For Starters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Detecting Packed Files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Analyzing Binary Files ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Behavioral Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Network Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Analyzing System Hooks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Building Toolkits
Response Toolkit: CD ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Analysis Toolkit: VM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prevention & Recovery
Prevention – Whack-a-Mole ,[object Object],[object Object],[object Object]
Prevention: Local Admin? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Parting Shot: Best Practices ,[object Object],[object Object],[object Object]
Q & A Session
1 sur 36

Contenu connexe

Tendances(20)

MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
n|u - The Open Security Community3.3K vues
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
NishaYadav177491 vues
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
GIBIN JOHN1.4K vues
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
Arpan Raval983 vues
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
Rand W. Hirt5.6K vues
Red Team FrameworkRed Team Framework
Red Team Framework
👀 Joe Gray2.9K vues
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong8.3K vues
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner12.7K vues
Social engineeringSocial engineering
Social engineering
Vishal Kumar12.3K vues
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Adri Jovin767 vues

Similaire à Malware Analysis Made Simple(20)

 Security Handbook Security Handbook
Security Handbook
Anthony Hasse197 vues
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
Greater Noida Institute Of Technology46 vues
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
TechBiz Forense Digital469 vues
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuce
Db Cooper2.9K vues
Sembang2 Keselamatan It 2004Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia756 vues
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
Vincent Ohprecio634 vues
Modern Malware and ThreatsModern Malware and Threats
Modern Malware and Threats
MarketingArrowECS_CZ1.7K vues
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian3.2K vues
Modern malware and threatsModern malware and threats
Modern malware and threats
Martin Holovský1.5K vues
HackingHacking
Hacking
rameswara reddy venkat47 vues
HackingHacking
Hacking
Roshan Chaudhary1.4K vues
Security by Weston HeckerSecurity by Weston Hecker
Security by Weston Hecker
EC-Council590 vues
Metasploit Framework Executable EncodingMetasploit Framework Executable Encoding
Metasploit Framework Executable Encoding
technology_flow1.1K vues

Dernier(20)

Malware Analysis Made Simple