8th Meetup – Dissecting Android APK
In this meet, Abhishek J M presented on “Dissecting Android APK” Video Demo :
In this meet, Abhishek J M presented on “Dissecting Android APK” Video Demo :
In this meet, Ajithkumar V presented on “Elliptic curve cryptography”
In this meet, Monnappa K A presented on “Investigating Malware using Memory Forensics” Video Demo: https://youtu.be/C6uUDl0Vc6E
In this meet, Ajay pratap Singh delivered presentation on “Attacking and Crashing IoT Devices via Bluetooth LE protocol”
In this presentation, Monnappa explained the concept of code injection and hollow process injection. He demonstrated the working of hollow process injection using reverse engineering and showed how such infections can be detected and investigated using memory forensics Presentation: Demo 1 – Understanding Hollow Process Injection Using Reverse Engineering: Demo 2 – Investigating […]
In this presentation, Anirudh Duggal covered the techniques used to fingerprint vulnerable hospitals and healthcare infrastructure using web based tools. He also explained the potential attack points and the measures that can be taken to secure such infrastructure. Presentation:
In this presentation, Abhinav chourasia covered the concept of Buffer Overflow and he also demonstrated how one can exploit a vulnerable application and take control of a system and execute arbitrary commands on the system Presentation:
In this presentation, Satyam Saxena talked about features that can be used to detect DGA domains and he also covered how Whois information and passive dns data can be used to build model to detect the infected systems Presentation:
In this presentation, Adarsh Agarwal covered the the infection mechanism of Ransomwares, different variants of Ransomwares, differences between the variants, anatomy of ransomwares, timeline of the Ransomware infections since jan 2016 and the case study of TeslaCrypt V2 Presentation:
In this presentation, Monnappa covered Linux malware analysis and showed automation of Linux malware analysis using Limon sandbox, he also demonstrated analysis of Linux malwares Tsunami, Mayhem and Suterusu Rootkit using Limon Presentation: Demo 1 – Analysis of Linux Malware Tsunami using Limon: Demo 2a – Analysis of Linux Malware Mayhem using […]