Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

End-to-End Analysis of a Domain Generating Algorithm Malware Family

Автор: RSA Conference

Загружено: 2014-05-08

Просмотров: 20251

Описание:

Jason Geffner, Senior Security Researcher, CrowdStrike, Inc.

Select malware families have used Domain Generating Algorithms (DGAs) over the past few years in an effort to evade analysts' abilities to predict attackers' control servers. This presentation demonstrates end-to-end analysis of a DGA malware family, from binary deobfuscation to DGA analysis, to sinkholing, to domain registrant research, to attribution of the malware's author and accomplices.

End-to-End Analysis of a Domain Generating Algorithm Malware Family

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Analyzing Windows Malware on Linux: Getting Started Tips and Examples

Analyzing Windows Malware on Linux: Getting Started Tips and Examples

Иран. Как все кончится. Старый кремлевский телефон. Русский след.

Иран. Как все кончится. Старый кремлевский телефон. Русский след.

Cyber security: Executive Simulation of a Cyber Attack - Kevin Duffy

Cyber security: Executive Simulation of a Cyber Attack - Kevin Duffy

Domain Admin via IPv6 DNS Takeover

Domain Admin via IPv6 DNS Takeover

SHELLCON 2017 Technical Keynote: What Can Reverse Engineering Do For You? Amanda Rousseau

SHELLCON 2017 Technical Keynote: What Can Reverse Engineering Do For You? Amanda Rousseau

Статический анализ вредоносных программ | Полное пошаговое руководство с практическими советами

Статический анализ вредоносных программ | Полное пошаговое руководство с практическими советами

The First 6 Months as a CISO Determines Success or Failure

The First 6 Months as a CISO Determines Success or Failure

Most Ransomware Isn't As Complex As You Might Think

Most Ransomware Isn't As Complex As You Might Think

Open Source Malware Lab - Robert Simmons

Open Source Malware Lab - Robert Simmons

Sinkholing the Domain Generation Algorithm of m0yv

Sinkholing the Domain Generation Algorithm of m0yv

Splunk Tutorial for Beginners (Cyber Security Tools)

Splunk Tutorial for Beginners (Cyber Security Tools)

Bypassing Firewalls with DNS Tunnelling (Defence Evasion, Exfiltration and Command & Control)

Bypassing Firewalls with DNS Tunnelling (Defence Evasion, Exfiltration and Command & Control)

DGA Detection & Optimization - Gunter Ollmann

DGA Detection & Optimization - Gunter Ollmann

How to Make Sense of Cybersecurity Frameworks

How to Make Sense of Cybersecurity Frameworks

How Do Packers Work - Reverse Engineering

How Do Packers Work - Reverse Engineering "FUD" Aegis Crypter

Bypassing BlackMatter Anti-Debug With x64dbg [Patreon Unlocked]

Bypassing BlackMatter Anti-Debug With x64dbg [Patreon Unlocked]

Fileless Malware Demystified

Fileless Malware Demystified

Real world examples of malware using DNS for exfiltration and C&C channels

Real world examples of malware using DNS for exfiltration and C&C channels

capa: Automatically Identify Malware Capabilities w/ Ballenthin & Moritz Raabe - SANS DFIR Summit

capa: Automatically Identify Malware Capabilities w/ Ballenthin & Moritz Raabe - SANS DFIR Summit

DNS tunneling down the rabbit hole

DNS tunneling down the rabbit hole

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com