Главная
Study mode:
on
1
Intro
2
A STORY ABOUT BOB
3
AN MEAN DETECTION RATE 17%
4
WHY THREAT INTELLIGENCE?
5
REDIRECTION CHAINS
6
USER AGENT STRINGS / REFERER
7
FROM A COMPROMISED SERVER
8
BASIC MODE
9
MONITOR MODE
10
INPUT MODE
11
INTERNET EXPLORER
12
FIREBUG EXTENSION FOR FIREFOX
13
OBFUSCATION TECHNIQUES
14
CONCATENATION
15
HEXADECIMAL CHARCODES
16
ARITHMETIC ON THE CHARCODE
17
STRING SPLITTING
18
CHARACTER REPLACEMENT
19
BASE32 CONVERSIONS
20
FUNCTION REFERENCES
21
BLACKHOLE EXPLOIT KIT
22
DECODING WITH PYTHON
23
BLACKHOLE DECODED
24
VIM FOLDING TO THE RESCUE!
25
PAYLOADS
26
GFI SANDBOX REPORT
27
GFI SANDBOX - REGISTRY KEYS
28
QUESTIONS?
Description:
Explore the world of threat intelligence and malware analysis in this 36-minute video from Derbycon 2012. Dive into topics such as redirection chains, user agent strings, and obfuscation techniques. Learn about monitoring modes, input modes, and browser-specific considerations for Internet Explorer and Firefox. Examine various obfuscation methods including concatenation, hexadecimal charcodes, arithmetic operations, string splitting, and base32 conversions. Analyze the Blackhole Exploit Kit, decode malware using Python, and interpret GFI Sandbox reports. Gain practical insights into payload analysis and registry key examination to enhance your skills in hunting and detecting malicious activities.

Hunting Evil - Threat Intelligence and Malware Analysis Techniques

Add to list