1

4th Quarterly Meetup – 23rd May 2015

In this meet, Subrat Sarkar delivered presentation on “Exposing the secrets of Windows Credential Provider”, Raghav Pande covered the topic on “Defeating Public Exploit Protections(EMET v5.2 and more)”, Amit Malik presented the topic “Return Address – The Silver Bullet” and Monnappa KApresented the topic on “Hunting Rootkit From the Dark Corners Of Memory”.   Here […]

2

3rd Quarterly Meetup – 24th Jan 2015

In this meet, Sameer Patil delivered presentations on “Anatomy of Exploit Kits”, Satyam Saxenacovered the topic on “Detecting the Malicious Url using Machine Learning” and Monnappa KApresented the topic on “Hunting the Gh0st RAT cyber espionage malware using Memory Forensics”.   Here is the link to presentations and video demonstrations: 1. Anatomy of Exploit Kits […]

14

3rd Meetup – Hunting Ghost RAT Using Memory Forensics

In this awesome presentation, Monnappa KA explained the details of Ghost RAT malware used in various Cyber Espionage attacks. He showcased the sandbox analysis, traffic pattern and decrypting the communications of Ghost RAT from packet capture. He also demonstrated both manual and automated method of detecting and decrypting the communications of Ghost RAT using memory […]