In this awesome presentation, Subrat Sarkar explained the concepts of Windows logon mechanism, Windows Logon architecture, Windows credential provider and showed how an attacker can take advantage of credential provider to steal Windows password in plain text and how to find and mitigate this issue. Presentation:
You are browsing archives for
Here is the quick update and presentations from our recently concluded Third ‘SecurityXploded Cyber Security Quarterly Meetup’. In this meet, Sameer Patil delivered presentations on “Anatomy of Exploit Kits”, Satyam Saxena covered the topic on “Detecting the Malicious Url using Machine Learning” and Monnappa KA presented the topic on “Hunting the Gh0st RAT […]
Here is the quick update and presentations from our recently concluded first ever ‘SecurityXploded Quarterly Meet’. Our rocking stars, Amit Malik & Monnappa delivered fabulous presentations on detection and mitigation of advanced attacks emerging in Security arena. Here is the link to presentations and video demonstrations, 1. Watering Hole Attacks Case Study and Analysis […]
In this presentation Monnappa showcased a novel concept in security arena – “Watering Hole Attack”. He presented various exploitation methods around it using the practical video demonstration. Presentation: Video Demonstration: References: http://about-threats.trendmicro.com/RelatedThreats.aspx?language=au&name=Watering+Hole+101 http://www.fireeye.com/blog/technical/cyber-exploits/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html http://www.securityweek.com/new-ie-10-zero-day-used-watering-hole-attack-targeting-us-military http://blogs.cisco.com/security/watering-hole-attacks-target-energy-sector/
This is final session of our first training series on ‘Revering & Malware Analysis’. It shows what we have done so far and what we will be doing in the coming days!
This is advanced session demonstrating various features of HeartBeat APT RAT. Kindly check out the reference section at the end of presentation for more details.
This session illustrates secrets of HearBeat Rat by reversing and decrypting its internal communication mechanism.
This session will discuss android architecture and some malware analysis tools to analyse android malwares. Check reference section for more information.
This session will introduce you some tools and techniques for malware memory forensics. Check the reference section for more information.
This session will introduce you with some automated analysis techniques. Apart from our presentation and system we highly recommend cuckoo box, install and play with it. Check reference section for more information.