SlideShare a Scribd company logo
Soumettre la recherche
Mettre en ligne
Malware Analysis Made Simple
Signaler
Paul Melson
IS Director, Information Security Risk & Compliance à Spectrum Health
Suivre
•
6 j'aime
•
2,556 vues
1
sur
36
Malware Analysis Made Simple
•
6 j'aime
•
2,556 vues
Signaler
Technologie
"Malware Analysis Made Simple" from SecureWorld Expo Detroit, 11/05/2008
Lire la suite
Paul Melson
IS Director, Information Security Risk & Compliance à Spectrum Health
Suivre
Recommandé
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
3.6K vues
•
25 diapositives
Threat hunting for Beginners
SKMohamedKasim
461 vues
•
39 diapositives
MITRE ATT&CK framework
Bhushan Gurav
817 vues
•
30 diapositives
VAPT PRESENTATION full.pptx
DARSHANBHAVSAR14
1.9K vues
•
36 diapositives
Malware analysis
Prakashchand Suthar
3.3K vues
•
39 diapositives
Penetration testing reporting and methodology
Rashad Aliyev
5.3K vues
•
18 diapositives
Contenu connexe
Tendances
Leveraging MITRE ATT&CK - Speaking the Common Language
Erik Van Buggenhout
4K vues
•
39 diapositives
Vapt( vulnerabilty and penetration testing ) services
Akshay Kurhade
529 vues
•
11 diapositives
MITRE ATT&CK Framework
n|u - The Open Security Community
3.3K vues
•
31 diapositives
Footprinting and reconnaissance
NishaYadav177
491 vues
•
8 diapositives
Windows Threat Hunting
GIBIN JOHN
1.4K vues
•
17 diapositives
Introduction to MITRE ATT&CK
Arpan Raval
983 vues
•
31 diapositives
Tendances
(20)
Leveraging MITRE ATT&CK - Speaking the Common Language
Erik Van Buggenhout
•
4K vues
Vapt( vulnerabilty and penetration testing ) services
Akshay Kurhade
•
529 vues
MITRE ATT&CK Framework
n|u - The Open Security Community
•
3.3K vues
Footprinting and reconnaissance
NishaYadav177
•
491 vues
Windows Threat Hunting
GIBIN JOHN
•
1.4K vues
Introduction to MITRE ATT&CK
Arpan Raval
•
983 vues
Introduction To Vulnerability Assessment & Penetration Testing
Raghav Bisht
•
763 vues
Pen Testing Explained
Rand W. Hirt
•
5.6K vues
Malware analysis _ Threat Intelligence Morocco
Touhami Kasbaoui
•
246 vues
Red Team Framework
👀 Joe Gray
•
2.9K vues
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
•
3.7K vues
Module 8 System Hacking
leminhvuong
•
8.3K vues
Penetration Testing Basics
Rick Wanner
•
12.7K vues
Red team and blue team in ethical hacking
Vikram Khanna
•
712 vues
Social engineering
Vishal Kumar
•
12.3K vues
Introduction to Cybersecurity
Adri Jovin
•
767 vues
Threat Hunting with Splunk Hands-on
Splunk
•
3.1K vues
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
•
746 vues
Privilege escalation from 1 to 0 Workshop
Hossam .M Hamed
•
1K vues
Introduction to cyber security amos
Amos Oyoo
•
3.1K vues
En vedette
'Malware Analysis' by PP Singh
Bipin Upadhyay
2.3K vues
•
50 diapositives
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
4K vues
•
68 diapositives
PyTriage: A malware analysis framework
Yashin Mehaboobe
1.7K vues
•
14 diapositives
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
Sam Bowne
2.6K vues
•
46 diapositives
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Sam Bowne
6.3K vues
•
75 diapositives
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
3.3K vues
•
63 diapositives
En vedette
(20)
'Malware Analysis' by PP Singh
Bipin Upadhyay
•
2.3K vues
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
•
4K vues
PyTriage: A malware analysis framework
Yashin Mehaboobe
•
1.7K vues
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
Sam Bowne
•
2.6K vues
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Sam Bowne
•
6.3K vues
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
•
3.3K vues
CNIT 126 4: A Crash Course in x86 Disassembly
Sam Bowne
•
2.2K vues
CNIT 126 7: Analyzing Malicious Windows Programs
Sam Bowne
•
1.9K vues
CNIT 127 14: Protection Mechanisms
Sam Bowne
•
931 vues
CNIT 126 6: Recognizing C Code Constructs in Assembly
Sam Bowne
•
1.2K vues
CNIT 126 8: Debugging
Sam Bowne
•
588 vues
CNIT 126 5: IDA Pro
Sam Bowne
•
2.1K vues
Practical Malware Analysis Ch12
Sam Bowne
•
1.3K vues
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Sam Bowne
•
1.4K vues
Ch 13: Network Protection Systems
Sam Bowne
•
1.9K vues
Cybersecurity and The Board
Paul Melson
•
8.3K vues
Practical Malware Analysis: Ch 11: Malware Behavior
Sam Bowne
•
3.3K vues
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Sam Bowne
•
3.5K vues
Practical Malware Analysis: Ch 15: Anti-Disassembly
Sam Bowne
•
6K vues
Introduction to Malware Analysis
Andrew McNicol
•
8.4K vues
Similaire à Malware Analysis Made Simple
Two-For-One Talk: Malware Analysis for Everyone
Paul Melson
1.9K vues
•
44 diapositives
Security Handbook
Anthony Hasse
197 vues
•
10 diapositives
Hacking and its Defence
Greater Noida Institute Of Technology
46 vues
•
39 diapositives
Basic Dynamic Analysis of Malware
Natraj G
1.9K vues
•
20 diapositives
Cybersecurity - Jim Butterworth
TechBiz Forense Digital
469 vues
•
79 diapositives
DevSecCon Talk: An experiment in agile Threat Modelling
zeroXten
996 vues
•
50 diapositives
Similaire à Malware Analysis Made Simple
(20)
Two-For-One Talk: Malware Analysis for Everyone
Paul Melson
•
1.9K vues
Security Handbook
Anthony Hasse
•
197 vues
Hacking and its Defence
Greater Noida Institute Of Technology
•
46 vues
Basic Dynamic Analysis of Malware
Natraj G
•
1.9K vues
Cybersecurity - Jim Butterworth
TechBiz Forense Digital
•
469 vues
DevSecCon Talk: An experiment in agile Threat Modelling
zeroXten
•
996 vues
An experiment in agile threat modelling
DevSecCon
•
638 vues
2600 av evasion_deuce
Db Cooper
•
2.9K vues
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia
•
756 vues
Intro2 malwareanalysisshort
Vincent Ohprecio
•
634 vues
Modern Malware and Threats
MarketingArrowECS_CZ
•
1.7K vues
Workshop on BackTrack live CD
amiable_indian
•
3.2K vues
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
•
859 vues
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
•
412 vues
Modern malware and threats
Martin Holovský
•
1.5K vues
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk
•
685 vues
Hacking
rameswara reddy venkat
•
47 vues
Hacking
Roshan Chaudhary
•
1.4K vues
Security by Weston Hecker
EC-Council
•
590 vues
Metasploit Framework Executable Encoding
technology_flow
•
1.1K vues
Dernier
MemVerge: Memory Viewer Software
CXL Forum
117 vues
•
10 diapositives
GigaIO: The March of Composability Onward to Memory with CXL
CXL Forum
122 vues
•
12 diapositives
Business Analyst Series 2023 - Week 2 Session 3
DianaGray10
319 vues
•
22 diapositives
Java 21 and Beyond- A Roadmap of Innovations .pdf
Ana-Maria Mihalceanu
54 vues
•
90 diapositives
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk
82 vues
•
20 diapositives
Photowave Presentation Slides - 11.8.23.pptx
CXL Forum
120 vues
•
16 diapositives
Dernier
(20)
MemVerge: Memory Viewer Software
CXL Forum
•
117 vues
GigaIO: The March of Composability Onward to Memory with CXL
CXL Forum
•
122 vues
Business Analyst Series 2023 - Week 2 Session 3
DianaGray10
•
319 vues
Java 21 and Beyond- A Roadmap of Innovations .pdf
Ana-Maria Mihalceanu
•
54 vues
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk
•
82 vues
Photowave Presentation Slides - 11.8.23.pptx
CXL Forum
•
120 vues
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver
•
24 vues
"AI Startup Growth from Idea to 1M ARR", Oleksandr Uspenskyi
Fwdays
•
25 vues
"Ukrainian Mobile Banking Scaling in Practice. From 0 to 100 and beyond", Vad...
Fwdays
•
38 vues
MemVerge: Gismo (Global IO-free Shared Memory Objects)
CXL Forum
•
112 vues
JCon Live 2023 - Lice coding some integration problems
Bernd Ruecker
•
62 vues
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi
•
102 vues
Webinar : Competing for tomorrow’s leaders – How MENA insurers can win the wa...
The Digital Insurer
•
26 vues
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang
•
34 vues
Level-up Your Cloud Visibility Into AWS With ThousandEyes
ThousandEyes
•
88 vues
Liqid: Composable CXL Preview
CXL Forum
•
120 vues
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10
•
94 vues
"Thriving Culture in a Product Company — Practical Story", Volodymyr Tsukur
Fwdays
•
39 vues
PyCon ID 2023 - Ridwan Fadjar Septian.pdf
Ridwan Fadjar
•
165 vues
Green Leaf Consulting: Capabilities Deck
GreenLeafConsulting
•
177 vues
Malware Analysis Made Simple
1.
Malware Analysis Made
Simple SecureWorld Expo Detroit Wednesday, November 5, 2008 Paul Melson
2.
Security Incident Response
3.
4.
5.
Why Do Malware
Analysis In-House?
6.
7.
Malware Trends
8.
9.
10.
11.
Detection
12.
Anatomy of a
Drive-By Download Dropper Malware Servers More Malware JScript Exploit
13.
14.
15.
16.
17.
18.
Analysis
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
Building Toolkits
30.
31.
32.
Prevention & Recovery
33.
34.
35.
36.
Q & A
Session