Hunting Linux Malware for Fun and Flags

Hunting Linux Malware for Fun and Flags

RSA Conference via YouTube Direct link

Network configuration

18 of 25

18 of 25

Network configuration

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hunting Linux Malware for Fun and Flags

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 About this presentation
  3. 3 Why malware on Linux servers?
  4. 4 Why care?
  5. 5 Why understand them?
  6. 6 Artifacts
  7. 7 Common file metadata
  8. 8 Basic filesystem
  9. 9 Package integrity
  10. 10 Logs
  11. 11 Using auditd
  12. 12 Offline filesystem
  13. 13 Analyzing a live process
  14. 14 procfs exe magic link
  15. 15 Process stalling
  16. 16 Process memory dump
  17. 17 Kernel memory
  18. 18 Network configuration
  19. 19 Network capture
  20. 20 Two approaches
  21. 21 Reversing script-based malware
  22. 22 Reverse engineering compiled malware
  23. 23 This week you should
  24. 24 Within three months you should
  25. 25 Next you should

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.