|
4SICS 2015 - Monnappa K A Reversing and Decipering Cyber Espionage Malware Communic |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
4SICS 2015 - Monnappa K A Reversing and Decipering Cyber Espionage Malware Communic Par SecurityTube.NetLe [2016-02-25] à 11:41:23 Présentation : As a result of this years collaboration with FIRST, 4SICS are happy to annouce Monnappa K A monnappa22 as a presenter at the summit this year The title of his presentation is Reversing and Deciphering the Cyber Espionage Malware Communications The abstract of the presentation is The number of cyber espionage attacks APT is undoubtedly on the rise targeting government, military, corporate, educational, and civil society networks today. These advanced and sophisticated attacks focus on individual organizations in an effort to extract valuable information. Sometimes, these advanced attacks are allegedly linked to state-sponsored activities but may also be carried out by individual groups with their own goals. The cyber espionage actors APT attackers use malicious software malware to infect their targets.This presentation focuses on the case study of a cyber espionage campaign where advanced malware was used to target the victims and the presentation covers the reverse engineering details of this APT malware to understand techniques used by the espionage actors, its encrypted communication and finally the presentation touches on the topic of decrypting the communications of malware using the custom python script. Monnappa K A is based out of Bangalore,India. He works with Cisco s incident response team as information security investigator focusing on threat intelligence, investigation of advanced cyber attacks and researching on cyber espionage and APT attacks. His Fields of interest include malware analysis, reverse engineering, memory forensics and threat intelligence.As an active speaker in security conferences like Nullcon and SecurityXploded cyber security meetings, he has presented on various topics which include Memory Forensics, malware analysis, Rootkit analysis and also conducted training in FIRST Forum of Incident Response and Security teams TC in Amsterdam. He has also authored various articles in Hakin9, eForensics and HackInsight magazines For More Information Please Visit - https 4sics.se Les mots clés de la revue de presse pour cet article : reversing malware Les videos sur SecuObs pour les mots clés : reversing malware Les mots clés pour les articles publiés sur SecuObs : malware Les éléments de la revue Twitter pour les mots clé : malware Les derniers articles du site "SecurityTube.Net" :- TROOPERSCON - Crypto code the 9 circles of testing- TROOPERSCON - Towards a LangSec Aware SDLC- TROOPERSCON - Deep dive into SAP archive file formats- TROOPERSCON - Thanks SAP for the vulnerabilities. Exploiting the unexploitable- TROOPERSCON - An easy way into your multi-million dollar SAP systems An unknown default SAP account- TROOPERSCON - One Tool To Rule Them All- TROOPERSCON - Mind The Gap - Exploit Free Whitelisting Evasion Tactics- TROOPERSCON - The Chimaera Processor- TROOPERSCON - Lets Play Hide and Seek in the Cloud- TROOPERSCON - Planes, Trains and Automobiles The Internet of Deadly Things
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|