Catching Malware En Masse - DNS and IP Style

Catching Malware En Masse - DNS and IP Style

Black Hat via YouTube Direct link

BGP Outages

51 of 54

51 of 54

BGP Outages

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Catching Malware En Masse - DNS and IP Style

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Welcome
  3. 3 Agenda
  4. 4 Current Climate
  5. 5 Investigation Process
  6. 6 What is Fast Flux
  7. 7 Fast Flux Proxy Network
  8. 8 Zeus
  9. 9 CNC domains
  10. 10 Methods
  11. 11 Workflow
  12. 12 Semantic Library
  13. 13 Data Extraction
  14. 14 Citadel Examples
  15. 15 Botnet Examples
  16. 16 What is Pony
  17. 17 Passwords
  18. 18 Applications
  19. 19 Stats
  20. 20 Clients
  21. 21 IP Style
  22. 22 OVH Canada
  23. 23 OVH Ukraine
  24. 24 OVH Russia
  25. 25 Nuclear Exploited Domains
  26. 26 Prediction for Fight Protection
  27. 27 How we did it
  28. 28 Interest
  29. 29 Fingerprinting
  30. 30 Same server setup
  31. 31 Growing trend
  32. 32 OVH
  33. 33 Rope
  34. 34 Electric Kitten
  35. 35 Police
  36. 36 English dictionaries
  37. 37 ASN graph
  38. 38 Understanding the internet
  39. 39 The IT Crowd
  40. 40 The Internet
  41. 41 Why do we do this
  42. 42 OpenCL view
  43. 43 Cluster view
  44. 44 Network geek
  45. 45 Network connectivity
  46. 46 Investigation
  47. 47 Conclusions
  48. 48 Visual approach
  49. 49 Detect
  50. 50 Summary
  51. 51 BGP Outages
  52. 52 ISP Outages
  53. 53 Autonomous Systems
  54. 54 In Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.