|
DefCamp 2015 - Challenges on Reversing Layered Malware |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
DefCamp 2015 - Challenges on Reversing Layered Malware Par SecurityTube.NetLe [2016-01-22] à 05:50:48
Présentation : Raul is working at Fortinet as a Senior Security Researcher AV Team Lead since 2004. He is also the Lead Trainer responsible for training junior AV IPS analysts in malware analysis and reverse engineering. He is a regular contributor in his company blog posts and also in Virus Bulletin publication. He currently have 21 published articles in Virus Bulletin. Before Raul joined Fortinet, he was a Senior AntiVirus Engineer and an AntiVirus Trainer at TrendMicro Philippines. Raul was also a college instructor at two major universities in the Philippines. Challenges on Reversing Layered Malware Malware analysis using automated tools and sandboxes is the best and fastest response against malicious file execution. We can easily determine the effects of the malware, including network activities and system infection. Modern malware are now smarter than before, they can determine if they are being analyzed, being debugged, or simply being executed in a virtual environment. But to really know how the malware works, we have to dig deeper into its code. Layers in malware are defense mechanisms against deep analysis. Within these layers, different malware tricks are also deployed. In this presentation, we are going to look into Scieron, an information stealer Trojan. It is not known in the wild, perhaps due to its implementation of layers. We are going to look closely into its code on how it implements code injection and hooking. We will look into its use of shellcode and how it extracts another layer from the resource section of another layer. Also, we will investigate how it implements different layers to hide its main payload and to avoid detection. I will show a video demo on how the layers of Scieron are executed within the debugger. Also in this presentation, we will compare Scieron against Vawtrak, that also has layering technology in its code. Finally, we are going to leverage Volatility, a memory forensic tool, to detect the presence of layers in an infected system. For More Information Please Visit - http def.camp
Les mots clés de la revue de presse pour cet article : reversing malware Les videos sur SecuObs pour les mots clés : reversing malware Les mots clés pour les articles publiés sur SecuObs : malware Les éléments de la revue Twitter pour les mots clé : malware
Les derniers articles du site "SecurityTube.Net" :
- TROOPERSCON - Crypto code the 9 circles of testing - TROOPERSCON - Towards a LangSec Aware SDLC - TROOPERSCON - Deep dive into SAP archive file formats - TROOPERSCON - Thanks SAP for the vulnerabilities. Exploiting the unexploitable - TROOPERSCON - An easy way into your multi-million dollar SAP systems An unknown default SAP account - TROOPERSCON - One Tool To Rule Them All - TROOPERSCON - Mind The Gap - Exploit Free Whitelisting Evasion Tactics - TROOPERSCON - The Chimaera Processor - TROOPERSCON - Lets Play Hide and Seek in the Cloud - TROOPERSCON - Planes, Trains and Automobiles The Internet of Deadly Things
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|