SecurityTrainings

Posts in category Malware Analysis

Student Mentorship Programme Applicat...

Student Mentorship Programme Application Form [2014-2015]

Application Form for session 2014-2015 is online now.     To apply to this Mentorship Programme, aspiring students have to fill Mentorship Programme Application form. Please download the form here   Application form is divided into two parts Basic Information Screening Questions   #1 Basic Information – In this section students have to fill their […]

Call For Sessions – SecurityXpl...

Call For Sessions – SecurityXploded Meet – Bangalore, India!

This is call for sessions for “SecurityXploded Meet” on 21st June 2014 in Bangalore. As you may already know that we have announced a quarterly dedicated system security meet (http://goo.gl/JQaBPy). The focus of the meet is to discuss analysis and innovations around the system security area and to interact with the like minded people to […]

Session 11: (Part 2) Dissecting the H...

Session 11: (Part 2) Dissecting the HeartBeat APT RAT Features

This is advanced session demonstrating various features of HeartBeat APT RAT.  Kindly check out the reference section at the end of presentation for more details.    

Session 10: (Part 1) Reversing &...

Session 10: (Part 1) Reversing & Decrypting Communications of HeartBeat RAT

This session illustrates secrets of HearBeat Rat by reversing and decrypting its internal communication mechanism.    

Session 9: Malware Analysis using PyM...

Session 9: Malware Analysis using PyMal & Malpimp

Pymal and Malpimp are the two tools developed by us to accelerate the analysis process. This session demonstrates the use and purpose of both tools.  

Session 7: Malware Memory Forensics

Session 7: Malware Memory Forensics

This session will introduce you some tools and techniques for malware memory forensics. Check the reference section for more information.    

Session 6: Malware Sandbox Analysis

Session 6: Malware Sandbox Analysis

This session will introduce you with some automated analysis techniques. Apart from our presentation and system we highly recommend cuckoo box, install and play with it. Check reference section for more information.    

Session 2: Botnet Analysis – Part 1

Session 2: Botnet Analysis – Part 1

This session will discuss some stealth techniques used by malwares, also demonstrate some rapid reversing techniques to accelerate the reversing tasks. Check reference section for more information.    

Session 1: Detection and Removal of M...

Session 1: Detection and Removal of Malwares

This session will introduce you with some tools and tricks to identify and remove malwares from the infected system. Check the reference section for more information.    

Session 9 – Practical Reversing Part ...

Session 9 – Practical Reversing Part IV – Advanced Malware Analysis

This session will discuss some advanced techniques used by the malwares and cover some end to end techniques for malware analysis.