Главная
Study mode:
on
1
Intro
2
Necessary Elements of a Ransomware
3
Why Key Management?
4
Evolution of Key Management
5
The Windows
6
Ransomware and the
7
Why Use the Native
8
NotPetya Ransom Message
9
List of Imports
10
CryptoAPI Calls
11
CryptAcquire Context
12
CryptEncrypt
13
CryptimportKey
14
CryptDestroy
15
CryptRelease Context
16
Ransomware Design
17
Conclusion
Description:
Explore the evolution of ransomware key management and its interaction with the Windows CryptoAPI in this 26-minute conference talk from GrrCon 2018. Delve into the necessary elements of ransomware, the importance of key management, and its progression over time. Examine the relationship between Windows, ransomware, and the native CryptoAPI, using NotPetya as a case study. Learn about crucial CryptoAPI calls, including CryptAcquireContext, CryptEncrypt, CryptImportKey, CryptDestroy, and CryptReleaseContext. Gain insights into ransomware design and draw valuable conclusions about the intersection of cryptography and malicious software.

Crypto Gone Rogue - A Tale of Ransomware, Key Management, and the CryptoAPI

Add to list
0:00 / 0:00