Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

capa: Automatically Identify Malware Capabilities w/ Ballenthin & Moritz Raabe - SANS DFIR Summit

Автор: SANS Digital Forensics and Incident Response

Загружено: 2020-09-14

Просмотров: 6458

Описание:

Effective analysts are those that understand and prioritize files of interest during an incident response. However, understanding if a program is malicious, the role it plays during an attack, and its potential capabilities requires at least basic malware analysis skills. And often, it takes an experienced reverse engineer to recover a file's complete functionality and guess at the author's intent. We are here to clear that roadblock and demonstrate how to algorithmically triage an unknown program.

Our newest tool, called capa, takes automated malware triage to the next level going from simply saying "this is probably bad" to providing a concise description of what a program actually does. capa detects capabilities in programs to reduce the time-to-triage and make malware analysis more accessible. The tool reports a sample's capabilities, role (downloader, backdoor, etc.), and any suspicious or unique functionality. This report provides critical, decision-making information to anyone dealing with potentially malicious programs and especially forensic, intelligence, and malware analysts. Furthermore, with capa, you can make more confident decisions, because the tool explains how it came to a conclusion, letting you verify each step, if necessary.

capa uses a new algorithm that reasons over the features found in a file to identify its capabilities. The lowest level features range from disassembly tricks to coding constructs, while intermediate features include references to recognized strings or API calls. Users compose rules that train capa how to reason about features, and even the significance of other rules. This makes it easy for the community to extend the tool's ability to match capabilities in malware. Incidentally, the growing rule set is a practical taxonomy of the behaviors actually seen in malware and begins to codify the collective knowledge of reverse engineers.

At the SANS DFIR Summit we will open-source capa and share it with the DFIR industry. Attendees will learn how capa works and how to use it to enhance their analysis workflow. Moreover, we will teach attendees how to develop capability detections that extend capa. This way, everyone can leave the conference with both a new tool and the skills needed to customize it for their environment.

Willi Ballenthin, Senior Staff Reverse Engineer, FLARE/FireEye
Moritz Raabe, Staff Reverse Engineer, FLARE/FireEye

The annual SANS Digital Forensics & Incident Response (DFIR) Summit is the most comprehensive DFIR event of the year, bringing together a passionate and influential group of experts, cutting edge research and tools, immersive training, and industry networking opportunities. Learn more about this event at https://www.sans.org/event/digital-fo...

DFIRCON 2020 - Live Online
sans.org/event/dfircon-2020-live-online
Virtual, US Eastern | Mon, Nov 2 - Sat, Nov 7, 2020

Courses Available:
FOR308: Digital Forensics Essentials - NEW
FOR498: Battlefield Forensics & Data Acquisition
FOR500: Windows Forensic Analysis
FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
FOR518: Mac and iOS Forensic Analysis and Incident Response
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
FOR578: Cyber Threat Intelligence
FOR585: Smartphone Forensic Analysis In-Depth
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques

capa: Automatically Identify Malware Capabilities w/ Ballenthin & Moritz Raabe - SANS DFIR Summit

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

What’s New in REMnux v7

What’s New in REMnux v7

Malware Analysis with Binary Ninja Plugins (API Hashing)

Malware Analysis with Binary Ninja Plugins (API Hashing)

TSMC smashes forecasts with record profit as it rides AI boom | REUTERS

TSMC smashes forecasts with record profit as it rides AI boom | REUTERS

Finding and Decoding Malicious Powershell Scripts - SANS DFIR Summit 2018

Finding and Decoding Malicious Powershell Scripts - SANS DFIR Summit 2018

Assembly Calling Conventions For Reverse Engineers [Patreon Unlocked]

Assembly Calling Conventions For Reverse Engineers [Patreon Unlocked]

Hunting and Scoping A Ransomware Attack

Hunting and Scoping A Ransomware Attack

MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

MALWARE ANALYSIS - VBScript Decoding & Deobfuscating

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Malware Analysis Tools YOU COULD USE

Malware Analysis Tools YOU COULD USE

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Сисадмины больше не нужны? Gemini настраивает Linux сервер и устанавливает cтек N8N. ЭТО ЗАКОННО?

Shellcode Analysis: Strings, Deobfuscation & YARA (Malware Analysis & Reverse Engineering)

Shellcode Analysis: Strings, Deobfuscation & YARA (Malware Analysis & Reverse Engineering)

Что скрывают в вашем номере отеля? Реальный случаи слежки..

Что скрывают в вашем номере отеля? Реальный случаи слежки..

Программирование на ассемблере без операционной системы

Программирование на ассемблере без операционной системы

Malware Analysis Bootcamp - Analyzing The PE Header

Malware Analysis Bootcamp - Analyzing The PE Header

CLEANER Anatoly CHALLENGED BODYBUILDERS | GYM PRANK

CLEANER Anatoly CHALLENGED BODYBUILDERS | GYM PRANK

ВЗЛОМАЛ колонку и заменил Алису на своего ассистента: 5 лет на получение root и модификацию прошивки

ВЗЛОМАЛ колонку и заменил Алису на своего ассистента: 5 лет на получение root и модификацию прошивки

FLOSS Every Day: Automatically Extracting Obfuscated Strings from Malware- SANS DFIR Summit 2016

FLOSS Every Day: Automatically Extracting Obfuscated Strings from Malware- SANS DFIR Summit 2016

Как освоить анализ вредоносных программ и обратную разработку | Полная дорожная карта

Как освоить анализ вредоносных программ и обратную разработку | Полная дорожная карта

Reversing Maldev.exe with Ghidra

Reversing Maldev.exe with Ghidra

Они следят за вами через Wi-Fi… и вы об этом не догадываетесь

Они следят за вами через Wi-Fi… и вы об этом не догадываетесь

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com