Learn how to leverage WINE and Proton compatibility tools for malware analysis in this DEF CON 31 conference talk. Discover techniques for configuring environments to efficiently collect Indicators of Compromise (IoCs) from unknown malware samples without relying on expensive sandbox solutions. Master the use of UNIX tools like awk and grep to extract forensic evidence while maintaining sample privacy. For offensive security practitioners, explore methods to accelerate the testing and deployment cycle of malware analysis. The presentation demonstrates how the same platforms enabling AAA Windows games on Linux can be repurposed for cybersecurity research and malware investigation, offering both defensive and offensive security insights.
Overview
Syllabus
DEF CON 31 Packet Hacking Village - WINE Pairing with Malware - Jared Stroud
Taught by
DEFCONConference