SecurityTrainings

Posts in category Presentations

SX 4th Meetup – Exposing the se...

SX 4th Meetup – Exposing the secrets of Windows credential provider

In this awesome presentation, Subrat Sarkar explained the concepts of Windows logon mechanism, Windows Logon architecture, Windows credential provider and showed how an attacker can take advantage of credential provider to steal Windows password in plain text and how to find and mitigate this issue.   Presentation:    

SecurityXploded 3rd Quarterly Meetup ...

SecurityXploded 3rd Quarterly Meetup – 24th Jan 2015

Here is the quick update and presentations from our recently concluded Third ‘SecurityXploded Cyber Security Quarterly Meetup’.     In this meet, Sameer Patil delivered presentations on “Anatomy of Exploit Kits”, Satyam Saxena covered the topic on “Detecting the Malicious Url using Machine Learning” and Monnappa KA presented the topic on “Hunting the Gh0st RAT […]

SecurityXploded 1st Quarterly Meet &#...

SecurityXploded 1st Quarterly Meet – 21st Jun 2014

Here is the quick update and presentations from our recently concluded first ever ‘SecurityXploded Quarterly Meet’.     Our rocking stars, Amit Malik & Monnappa delivered fabulous presentations on detection and mitigation of advanced attacks emerging in Security arena. Here is the link to presentations and video demonstrations, 1. Watering Hole Attacks Case Study and Analysis […]

SX Meetup 1 – Watering Hole Att...

SX Meetup 1 – Watering Hole Attacks Case Study and Analysis

In this presentation Monnappa showcased a novel concept in security arena – “Watering Hole Attack”. He presented various exploitation methods around it using the practical video demonstration.   Presentation:     Video Demonstration:     References: žhttp://about-threats.trendmicro.com/RelatedThreats.aspx?language=au&name=Watering+Hole+101 http://www.fireeye.com/blog/technical/cyber-exploits/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html http://www.securityweek.com/new-ie-10-zero-day-used-watering-hole-attack-targeting-us-military žhttp://blogs.cisco.com/security/watering-hole-attacks-target-energy-sector/    

Session 13 – Further Reading & F...

Session 13 – Further Reading & Future Roadmap

This is final session of our first training series on ‘Revering & Malware Analysis’.  It shows what we have done so far and what we will be doing in the coming days!  

Session 11: (Part 2) Dissecting the H...

Session 11: (Part 2) Dissecting the HeartBeat APT RAT Features

This is advanced session demonstrating various features of HeartBeat APT RAT.  Kindly check out the reference section at the end of presentation for more details.    

Session 10: (Part 1) Reversing &...

Session 10: (Part 1) Reversing & Decrypting Communications of HeartBeat RAT

This session illustrates secrets of HearBeat Rat by reversing and decrypting its internal communication mechanism.    

Session 8: Introduction to Android Ar...

Session 8: Introduction to Android Architecture and its Malware Analysis

This session will discuss android architecture and some malware analysis tools to analyse android malwares. Check reference section for more information.    

Session 7: Malware Memory Forensics

Session 7: Malware Memory Forensics

This session will introduce you some tools and techniques for malware memory forensics. Check the reference section for more information.    

Session 6: Malware Sandbox Analysis

Session 6: Malware Sandbox Analysis

This session will introduce you with some automated analysis techniques. Apart from our presentation and system we highly recommend cuckoo box, install and play with it. Check reference section for more information.