Главная
Study mode:
on
1
Intro
2
Forcepoint
3
Special Investigation Team
4
Collaboration
5
Big Data
6
Looking at Other Peoples Data
7
SQLite Database
8
Database Documentation
9
Commands
10
The complicated bit
11
Location
12
Victims
13
Aggregation
14
Targeting
15
dwell time
16
strange things
17
large PNG
18
UDT
19
Commander Control
20
Source Code
21
Summary
22
Questions
23
Insights
Description:
Dive into an in-depth analysis of the JAKU Botnet in this 32-minute conference talk by Andrew Settle from Forcepoint. Explore the collaborative efforts of the Special Investigation Team and their use of big data techniques to uncover crucial insights. Learn about the SQLite database structure, command analysis, and the intricacies of victim targeting. Examine the botnet's geographical spread, dwell times, and unusual characteristics such as large PNG files and UDT communication. Gain valuable knowledge about the botnet's command and control infrastructure, and review its source code. Conclude with a summary of key findings and participate in a Q&A session to deepen your understanding of this sophisticated cyber threat.

Investigating JAKU Botnet - Analysis and Insights

The Cyber Academy
Add to list