Главная
Study mode:
on
1
Introduction
2
Who am I
3
What is malware packing
4
How malware packing works
5
Why people pack malware
6
Unpacking tools
7
Using a sandbox
8
Using kimoon
9
Overloading the Linux system
10
What is Unicorn
11
Executing a binary
12
Operating system
13
Loading into memory
14
Operating System Services
15
System Write Command
16
Bindings
17
Testing
18
Why reallife applications need more memory
19
System calls
20
Examples
21
Upx
22
Upx header
23
No idea
24
First things first
25
Unicorn Dump
26
PackerElf
27
ElfPacker
28
Code Cave
29
Why need a statically compiled binary
30
A typo
31
Documentation
32
MidgetPack
33
PasswordBased
34
Cryptography
35
Debugging
36
Malware Analysis
37
Conclusion
38
Python Code
39
Questions
Description:
Explore the intricacies of emulating packed Linux malware using the Unicorn Emulator Framework in this 30-minute conference talk from DefCamp 2019. Delve into the world of malware packing, understanding its mechanisms and purposes, while learning about various unpacking tools and techniques. Discover the power of the Unicorn framework for executing binaries and emulating operating system services. Examine real-world examples, including UPX packing, ELF files, and code caves. Gain insights into debugging, malware analysis, and the importance of statically compiled binaries. Conclude with practical Python code examples and engage in a Q&A session to deepen your understanding of this crucial aspect of information security.

Emulating Packed Linux Malware Using the Unicorn Emulator Framework - DefCamp - 2019

DefCamp
Add to list