Session 7: Malware Memory Forensics
This session covered the tools and techniques to perform malware memory forensics. Demo Video 1 – Malware Memory Forensics Demo Video 2 – Malware Memory Forensics
This session covered the tools and techniques to perform malware memory forensics. Demo Video 1 – Malware Memory Forensics Demo Video 2 – Malware Memory Forensics
This presentation covered the process of automating the analysis of malware using the custom written sandbox Demo Video 1 – Sanbox Analysis of Spybot Demo Video 2 – Sandbox Analysis of Zbot Demo Video 3 – Sandbox Analysis of Prolaco
This presentation covered the concept of automating reverse engineering using custom scripts and plugins.
Most of the time it is common to encounter malware which performs anti-analyis techniques, understanding these techniques will help in analyzing such malwares.
This session will introduce some more advanced methods of analysis and detection.
This session will discuss some stealth techniques used by malwares and also demonstrates some rapid reversing techniques to accelerate the reversing tasks. Video Demo
This session will introduce you with some tools and tricks to identify and remove malwares from the infected system. [Note: View the video in 720HD quality] Demo Video 1 Demo Video 2 Demo Video 3 Demo Video 4
Shell Detect is a tool to detect presence of Shell Code within a file or network stream. You can either provide raw binary file (such as generated from Metasploit or network stream file as input to this tool. These days attackers distribute malicious files which contains hidden exploit shell code. On opening such files, exploit shell […]
This session covered the concept of rootkit and demonstrated some of the techniques used by the rooktits. Demo Video 1: Mader – SSDT Hooking Demo Video 2: Prolaco – Process Hiding using DKOM Demo Video 3: Darkmegi/waltrodock – Installs Device Driver Demo Video 4: Carberp – Syscall Patch and Inline Hooks
This session discussed some of the protections added by the operating system and processors to mitigate the exploitation, and also presented some ways to bypass those protections. DemoVideo 1: Heap Spray DemoVideo 2: Bypassing DEP