Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Taming Worms, RATs, Dragons and More!

Type
Slides
Tags
intelligence, malware, malware analysis
Authors
Christiaan Beek
Event
Black Hat Abu Dhabi 2011
Indexed on
Mar 27, 2013
URL
https://media.blackhat.com/bh-ad-11/Beek/bh-ad-11-Beek-Taming_Worms_RATS_Dragons-Slides.pdf
File name
bh-ad-11-Beek-Taming_Worms_RATS_Dragons-Slides.pdf
File size
3.8 MB
MD5
dfb0ff7dac7a79fc95245981db78619b
SHA1
9d19a7bf2cdf9b1cf5f312204e82c331d875d728

Over years the use of malware has dramatically changed. Ranging from programmers exploring the malicious possibilities of their programming code, copycats trying to combine code snippets, to organized crime and governments using custom made malware for their purposes. Where financial gratification is the main drive for cybercrime, it seems that the hunger for secrets and intellectual property is taking over. Some examples of cases are: Operation Aurora, Night-Dragon and recently Shady-RAT. These are examples of investigations that started with the detection of unknown customized malware, hiding on corporate networks and ended in large investigations regarding Data Loss. So how is it possible that this malware was undetected? How can you detect hidden malware on your network using open-source tools, what patterns to look for? What countermeasures can you take? How to build a layered malware defense to keep unknown malware out of your network. In my talk I will give some demo's how you can use Wireshark to investigate networkdata for traces of malware, how to filter for suspicious connections.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !