2

3rd Quarterly Meetup – 24th Jan 2015

In this meet, Sameer Patil delivered presentations on “Anatomy of Exploit Kits”, Satyam Saxenacovered the topic on “Detecting the Malicious Url using Machine Learning” and Monnappa KApresented the topic on “Hunting the Gh0st RAT cyber espionage malware using Memory Forensics”.   Here is the link to presentations and video demonstrations: 1. Anatomy of Exploit Kits […]

14

3rd Meetup – Hunting Ghost RAT Using Memory Forensics

In this awesome presentation, Monnappa KA explained the details of Ghost RAT malware used in various Cyber Espionage attacks. He showcased the sandbox analysis, traffic pattern and decrypting the communications of Ghost RAT from packet capture. He also demonstrated both manual and automated method of detecting and decrypting the communications of Ghost RAT using memory […]

0

3rd Meetup – Anatomy of Exploit Kits

In this awesome presentation, Sameer Patil explained the concept of Exploit Kits and its working with some interesting case studies. He also covered various phases of exploitation and demonstrated the analysis of Nuclear and Fiesta exploit kits.   Presentation:   Video Demo 1:   Video Demo 2:

0

2nd Quarterly Meet – 27th Sep 2014

In this meet, Raghav Pande and Monnappa delivered fabulous presentations on reverse engineering the evasive tactics of advanced malwares. Here is the link to presentations and video demonstrations: 1. Dissecting BetaBot 2. Reversing and Decrypting the Communications of APT Malware Here are the few snapshots from the session

12

2nd Meetup – Reversing and Decrypting the Communications of APT Malware

In this awesome presentation, Monnappa explained about Etumbot malware used in a Cyber Espionage attack.  He showcased the sandbox analysis, Reverse engineering and Decrypting the communications of Etumbot Backdoor using practical video demonstrations.    Presentation:   Video Demo 1:   Video Demo 2:   Video Demo 3:   References: http://www.arbornetworks.com/asert/2014/06/illuminating-the-etumbot-apt-backdoor/ http://www.fireeye.com/blog/technical/botnet-activities-research/2014/09/darwins-favorite-apt-group-2.html