Indicators of Compromise - From Malware Analysis to Eradication

Indicators of Compromise - From Malware Analysis to Eradication

44CON Information Security Conference via YouTube Direct link

Intro

1 of 29

1 of 29

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Indicators of Compromise - From Malware Analysis to Eradication

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 About me
  3. 3 Malware Research Lab, 2012
  4. 4 How INT3 breakpoints work
  5. 5 Memory Breakpoints
  6. 6 Hardware breakpoints
  7. 7 Timing
  8. 8 Windows Internals
  9. 9 Debug Object Handle
  10. 10 Thread Hiding
  11. 11 Open Process
  12. 12 Parent Process
  13. 13 UnhandledExceptionFilter
  14. 14 Process Exploitation
  15. 15 Nanomites
  16. 16 Stolen Bytes (Stolen Code)
  17. 17 Virtual Machines (think JVM, not Box)
  18. 18 Guard Pages
  19. 19 Removing the PE Header
  20. 20 Anti-dumping
  21. 21 Exploiting IA-32 Instructions
  22. 22 Interrupt 2D
  23. 23 Stack Segment
  24. 24 Instruction Prefixes
  25. 25 Exploiting LA-32 Instructions
  26. 26 VM Detection
  27. 27 Debugger specific techniques
  28. 28 Other Techniques
  29. 29 Announcement

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.