Hunting Evil - Threat Intelligence and Malware Analysis Techniques

Hunting Evil - Threat Intelligence and Malware Analysis Techniques

via YouTube Direct link

WHY THREAT INTELLIGENCE?

4 of 28

4 of 28

WHY THREAT INTELLIGENCE?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hunting Evil - Threat Intelligence and Malware Analysis Techniques

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 A STORY ABOUT BOB
  3. 3 AN MEAN DETECTION RATE 17%
  4. 4 WHY THREAT INTELLIGENCE?
  5. 5 REDIRECTION CHAINS
  6. 6 USER AGENT STRINGS / REFERER
  7. 7 FROM A COMPROMISED SERVER
  8. 8 BASIC MODE
  9. 9 MONITOR MODE
  10. 10 INPUT MODE
  11. 11 INTERNET EXPLORER
  12. 12 FIREBUG EXTENSION FOR FIREFOX
  13. 13 OBFUSCATION TECHNIQUES
  14. 14 CONCATENATION
  15. 15 HEXADECIMAL CHARCODES
  16. 16 ARITHMETIC ON THE CHARCODE
  17. 17 STRING SPLITTING
  18. 18 CHARACTER REPLACEMENT
  19. 19 BASE32 CONVERSIONS
  20. 20 FUNCTION REFERENCES
  21. 21 BLACKHOLE EXPLOIT KIT
  22. 22 DECODING WITH PYTHON
  23. 23 BLACKHOLE DECODED
  24. 24 VIM FOLDING TO THE RESCUE!
  25. 25 PAYLOADS
  26. 26 GFI SANDBOX REPORT
  27. 27 GFI SANDBOX - REGISTRY KEYS
  28. 28 QUESTIONS?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.