Главная
Study mode:
on
1
Intro
2
WHAT ARE WE DOING?
3
FULL DISCLOSURE
4
OVERVIEW
5
MALWARE - POS
6
MALWARE - DROP SPOT
7
MALWARE - FINAL EXFILTRATION
8
THREAT SCORE?
9
STATIC & DYNAMIC
10
STATIC ANALYSIS
11
STATIC - SECTIONS
12
STRING ANALYSIS
13
DYNAMIC ANALYSIS
14
PROCESS MANAGEMENT
15
PROCESS CREATED
16
FTP PACKETS
17
IP SCANNER
18
WHAT DID WE LEARN?
19
EASY TO USE
20
DETECTION OBSESSION
21
VM EVASION
22
TO CONSIDER
23
RIGHT TOOLS FOR THE JOB?
24
ECON 101
25
WHEN TO USE A TOOL?
26
WHEN NOT TO USE A TOOL?
27
CAN SECURITY BE AUTOMATED?
28
SO SHOULD I BUY A SANDBOX OR WHAT BUDDY?
29
ARMS RACE
30
EVOLVE OR DIE
31
TRAINING
32
TECHNOLOGY ISN'T THE ONLY WAY
33
WHAT'S RIGHT FOR YOUR ORGANIZATION?
Description:
Explore the intricacies of target exfiltration malware using sandbox tools in this conference talk from Circle City Con 2014. Delve into the analysis of POS malware, drop spots, and final exfiltration techniques. Learn about static and dynamic analysis methods, including section examination and string analysis. Observe process management, FTP packet analysis, and IP scanning in action. Gain insights on the effectiveness of sandbox tools, VM evasion techniques, and the economics of cybersecurity. Discuss when to use or avoid automated tools, the potential for security automation, and the ongoing arms race in malware detection. Consider the importance of evolving strategies, training, and finding the right approach for your organization beyond just technological solutions.

Exploring the Target Exfiltration Malware with Sandbox Tools

Add to list
0:00 / 0:00