Главная
Study mode:
on
1
Intro
2
Why Do I Need A Malware Analysis Lab?
3
Malware Analysis Process Entry Points
4
Open Source Malware Analysis Tools
5
More Than Just Dynamic Analysis
6
Cuckoo Modified
7
Cuckoo Output
8
Wolf in Sheep's Clothing
9
Thug Output
10
Extracted Files
11
What is the Volatility Framework?
12
Operating System Support
13
Volatility Outout
14
Orchestration and Automation
Description:
Explore the world of open source malware analysis tools in this comprehensive 50-minute conference talk from Security BSides London. Dive into the essential components of a malware analysis lab, focusing on four main entry points: files, URLs, network traffic captures, and memory images. Learn about major open source tools for each entry point, including Cuckoo Sandbox for file analysis, Thug for URL analysis, Bro Network Security Monitor for network capture analysis, and the Volatility Framework for memory image analysis. Discover how to link these tools together to create an automated, comprehensive malware analysis lab. Gain insights into tool inputs, outputs, and potential automation techniques to enhance your malware analysis capabilities.

Open Source Malware Lab

Security BSides London
Add to list
0:00 / 0:00