Explore the world of threat intelligence and malware analysis in this 36-minute video from Derbycon 2012. Dive into topics such as redirection chains, user agent strings, and obfuscation techniques. Learn about monitoring modes, input modes, and browser-specific considerations for Internet Explorer and Firefox. Examine various obfuscation methods including concatenation, hexadecimal charcodes, arithmetic operations, string splitting, and base32 conversions. Analyze the Blackhole Exploit Kit, decode malware using Python, and interpret GFI Sandbox reports. Gain practical insights into payload analysis and registry key examination to enhance your skills in hunting and detecting malicious activities.
Hunting Evil - Threat Intelligence and Malware Analysis Techniques