SecurityTrainings

Session 12 – Case Study: Rootkit Analysis

Rootkit is the next level in malwares. Rootkits mostly compromise the kernel side of the operating system. So they are some of the most sophisticated piece of codes you will see in malwares.

Check the reference section for additional material. We highly recommend reading of “Rootkit Arsenal” book.

 

 

Similar posts
  • SecurityXploded 4th Quarterly Meetup ... Here is the quick update and presentations from our recently concluded Fourth ‘SecurityXploded Cyber Security Quarterly Meetup’.     In this meet, Subrat Sarkar delivered presentation on “Exposing the secrets of Windows Credential Provider”, Raghav Pande covered the topic on “Defeating Public Exploit Protections(EMET v5.2 and more)”, Amit Malik presented the topic “Return Address – [...]
  • SX 4th meetup – Hunting Rootkit... In this awesome presentation, Monnappa explained the concept of Rootkits, types of Rootkits, Memory Forensics. He demonstrated various stealth techniques used by the TDSS Rootkit and showed how to identify its presence and understand its capabilities and various functionality using memory forensics.   Presentation:     Video Demo: [...]
  • SX 4th Meetup – Exposing the se... In this awesome presentation, Subrat Sarkar explained the concepts of Windows logon mechanism, Windows Logon architecture, Windows credential provider and showed how an attacker can take advantage of credential provider to steal Windows password in plain text and how to find and mitigate this issue.   Presentation:   [...]
  • SecurityXploded Cyber Security Meetup... This is an announcement for the upcoming SecurityXploded cyber security community meetup on 23rd May 2015 in Bangalore, India. This meet is completely free and doesn’t require any registration or any other formalities to attend. The meet will start at 10 AM IST.   After the meet, we will upload the presentations/videos for our online [...]
  • SecurityXploded 3rd Quarterly Meetup ... Here is the quick update and presentations from our recently concluded Third ‘SecurityXploded Cyber Security Quarterly Meetup’.     In this meet, Sameer Patil delivered presentations on “Anatomy of Exploit Kits”, Satyam Saxena covered the topic on “Detecting the Malicious Url using Machine Learning” and Monnappa KA presented the topic on “Hunting the Gh0st RAT [...]

Leave a Reply

Your email address will not be published. Required fields are marked *