9th Meetup – POS Malware: Is your Debit/Credit Transactions Secure?
In this meet, Amit Malik delivered presentation on “POS Malware: Is your Debit/Credit Transactions Secure”
In this meet, Amit Malik delivered presentation on “POS Malware: Is your Debit/Credit Transactions Secure”
In this meet, Ajay Kumar delivered presentation on “Deep Web – what to do and what not to do ”
In this meet, Abhijit Mohanta delivered presentation on “Malware Detection using Machine Learning ”
Psinfo is a Volatility plugin which collects the process related information from the VAD (Virtual Address Descriptor) and PEB (Process Enivornment Block) and displays the collected information and suspicious memory regions for all the processes running on the system. This plugin should allow a security analyst to get the process related information and spot any […]
Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect and divert the forensic analysis techniques. The plugin detects such attacks by finding discrepancy in the VAD and PEB, it also disassembles the address of entry point to detect any redirection attempts and […]
This is an announcement for the upcoming Cysinfo cyber security community meetup on 19th November 2016 in Bangalore, India. This meet is completely free and doesn’t require any registration or any other formalities to attend. The meet will start at 9:30 AM IST. Venue: Amrita University (Amrita Vishwa Vidyapeetham) Bengaluru Campus Kasavanahalli, Carmelaram P.O. Bengaluru – […]
In this meet, Ajay pratap Singh delivered presentation on “Attacking and Crashing IoT Devices via Bluetooth LE protocol”,Monnappa K A presented on “Investigating Malware using Memory Forensics” and “Understanding APT1 malware techniques using malware analysis and reverse engineering”, Ajithkumar V presented on “Elliptic curve cryptography”, Abhishek J M presented on “Dissecting Android APK”, Amit Malik presented on “EMET evasion […]
In this meet,Monnappa K A presented on “Understanding APT1 malware techniques using malware analysis and reverse engineering” Video Demo : Part 1 – Behavioral Analysis Of APT1 WEBC2-DIV Part 2 – Reverse Engineering APT1 WEBC2-DIV Part 3 – Understanding the WEBC2-DIV Technique – Sleep Part 4 – Understanding the WEBC2-DIV Technique – Download
In this meet, Sameer Patil presented on “Exploits & Mitigations – Memory Corruption Techniques”