In this awesome presentation, Subrat Sarkar explained the concepts of Windows logon mechanism, Windows Logon architecture, Windows credential provider and showed how an attacker can take advantage of credential provider to steal Windows password in plain text and how to find and mitigate this issue. Presentation:
You are browsing archives for
Category: Presentations
SecurityXploded 3rd Quarterly Meetup – 2
Here is the quick update and presentations from our recently concluded Third ‘SecurityXploded Cyber Security Quarterly Meetup’. In this meet, Sameer Patil delivered presentations on “Anatomy of Exploit Kits”, Satyam Saxena covered the topic on “Detecting the Malicious Url using Machine Learning” and Monnappa KA presented the topic on “Hunting the Gh0st RAT […]
SecurityXploded 1st Quarterly Meet – 21s
Here is the quick update and presentations from our recently concluded first ever ‘SecurityXploded Quarterly Meet’. Our rocking stars, Amit Malik & Monnappa delivered fabulous presentations on detection and mitigation of advanced attacks emerging in Security arena. Here is the link to presentations and video demonstrations, 1. Watering Hole Attacks Case Study and Analysis […]
SX Meetup 1 – Watering Hole Attacks Case
In this presentation Monnappa showcased a novel concept in security arena – “Watering Hole Attack”. He presented various exploitation methods around it using the practical video demonstration. Presentation: Video Demonstration: References: http://about-threats.trendmicro.com/RelatedThreats.aspx?language=au&name=Watering+Hole+101 http://www.fireeye.com/blog/technical/cyber-exploits/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html http://www.securityweek.com/new-ie-10-zero-day-used-watering-hole-attack-targeting-us-military http://blogs.cisco.com/security/watering-hole-attacks-target-energy-sector/
Session 13 – Further Reading & Future Ro
This is final session of our first training series on ‘Revering & Malware Analysis’. It shows what we have done so far and what we will be doing in the coming days!
Session 11: (Part 2) Dissecting the Hear...
This is advanced session demonstrating various features of HeartBeat APT RAT. Kindly check out the reference section at the end of presentation for more details.
Session 10: (Part 1) Reversing & Decrypt
This session illustrates secrets of HearBeat Rat by reversing and decrypting its internal communication mechanism.
Session 8: Introduction to Android Archi...
This session will discuss android architecture and some malware analysis tools to analyse android malwares. Check reference section for more information.
Session 7: Malware Memory Forensics
This session will introduce you some tools and techniques for malware memory forensics. Check the reference section for more information.
Session 6: Malware Sandbox Analysis
This session will introduce you with some automated analysis techniques. Apart from our presentation and system we highly recommend cuckoo box, install and play with it. Check reference section for more information.