Главная
Study mode:
on
1
Introduction
2
Practical Matter Analysis
3
Outline
4
Background Malware
5
Protocols
6
Infrastructure
7
Beaconing
8
Why Fake the Network
9
Existing Tools
10
Fake DNS
11
Fake DNS GUI
12
Netcat
13
Inetsim
14
FakeNet
15
Goals
16
Usage
17
Downloading Files
18
Downloading Programs
19
Layered Service Providers
20
How Does It Work
21
Listeners
22
WSP dll
23
Packet Capture
24
Output Options
25
Python
26
Fame
27
New Features
28
Process Logging
29
Bug Breakpoint
30
Demo EXE
31
Stop DNS Service
32
Post Response
33
IP Address
34
Additional Changes
35
Whats Next
36
Lunch
Description:
Explore advanced techniques for dynamic malware analysis in this Black Hat conference talk. Learn to use FakeNet 2.0, a free Windows network simulation tool, to trick malware into believing it's connected to the Internet. Master mimicking common protocols like HTTP, SSL, and DNS, and discover how to quickly reconfigure FakeNet for successful malware deception. Gain insights into Windows Internals, process tracking for identifying malicious network activity, and automatic PCAP logging. Participate in hands-on challenges analyzing real-world malware samples to extract network-based signatures, progressing from basic to advanced levels. Understand how to extend FakeNet's capabilities by writing Python extensions for custom malware protocols. Bring your Windows malware analysis Virtual Machine or use a provided one to fully engage in this practical, skill-building session.

Counterfeiting the Pipes with FakeNet 2.0

Black Hat
Add to list
0:00 / 0:00