0

3rd Meetup – Anatomy of Exploit Kits

In this awesome presentation, Sameer Patil explained the concept of Exploit Kits and its working with some interesting case studies. He also covered various phases of exploitation and demonstrated the analysis of Nuclear and Fiesta exploit kits.   Presentation:   Video Demo 1:   Video Demo 2:

0

2nd Quarterly Meet – 27th Sep 2014

In this meet, Raghav Pande and Monnappa delivered fabulous presentations on reverse engineering the evasive tactics of advanced malwares. Here is the link to presentations and video demonstrations: 1. Dissecting BetaBot 2. Reversing and Decrypting the Communications of APT Malware Here are the few snapshots from the session

12

2nd Meetup – Reversing and Decrypting the Communications of APT Malware

In this awesome presentation, Monnappa explained about Etumbot malware used in a Cyber Espionage attack.  He showcased the sandbox analysis, Reverse engineering and Decrypting the communications of Etumbot Backdoor using practical video demonstrations.    Presentation:   Video Demo 1:   Video Demo 2:   Video Demo 3:   References: http://www.arbornetworks.com/asert/2014/06/illuminating-the-etumbot-apt-backdoor/ http://www.fireeye.com/blog/technical/botnet-activities-research/2014/09/darwins-favorite-apt-group-2.html

0

1st Quarterly Meet – 21st Jun 2014

Our rocking stars, Amit Malik & Monnappa delivered fabulous presentations on detection and mitigation of advanced attacks emerging in Security arena. Here is the link to presentations and video demonstrations, 1. Watering Hole Attacks Case Study and Analysis 2. Chronicles of Malware and Detection Systems. Here are the few snapshots from the session,      

14

Meetup 1 – Watering Hole Attacks Case Study and Analysis

In this presentation Monnappa showcased a novel concept in security arena – “Watering Hole Attack”. He presented various exploitation methods around it using the practical video demonstration.   Presentation:   Video Demonstration: References: žhttp://about-threats.trendmicro.com/RelatedThreats.aspx?language=au&name=Watering+Hole+101 http://www.fireeye.com/blog/technical/cyber-exploits/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html http://www.securityweek.com/new-ie-10-zero-day-used-watering-hole-attack-targeting-us-military žhttp://blogs.cisco.com/security/watering-hole-attacks-target-energy-sector/

6

PyMal

PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and Volatility. The main aim of the project is to combine all the Malware Analysis related tools into a single interface for rapid analysis.   PyMal have several wrapper functions to manipulate Executable […]