Главная
Study mode:
on
1
Intro
2
About me
3
Malware Research Lab, 2012
4
How INT3 breakpoints work
5
Memory Breakpoints
6
Hardware breakpoints
7
Timing
8
Windows Internals
9
Debug Object Handle
10
Thread Hiding
11
Open Process
12
Parent Process
13
UnhandledExceptionFilter
14
Process Exploitation
15
Nanomites
16
Stolen Bytes (Stolen Code)
17
Virtual Machines (think JVM, not Box)
18
Guard Pages
19
Removing the PE Header
20
Anti-dumping
21
Exploiting IA-32 Instructions
22
Interrupt 2D
23
Stack Segment
24
Instruction Prefixes
25
Exploiting LA-32 Instructions
26
VM Detection
27
Debugger specific techniques
28
Other Techniques
29
Announcement
Description:
Learn to identify and eradicate malware in corporate networks using freely available tools in this 50-minute workshop. Explore techniques from locating unknown malware to analyzing samples and identifying indicators of compromise. Dive into advanced topics like Windows internals, debug object handling, thread hiding, process exploitation, anti-dumping techniques, and virtual machine detection. Gain practical skills in malware analysis, reverse engineering, and enterprise-wide threat mitigation through hands-on exercises and expert guidance.

Indicators of Compromise - From Malware Analysis to Eradication

44CON Information Security Conference
Add to list
00:00
-00:17