Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Dissecting a Ransomware-Infected MBR - Raul Alvarez - Hack in Paris - 2017

Hack in Paris via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of ransomware-infected Master Boot Records (MBR) in this 38-minute conference talk from Hack in Paris 2017. Delve into the boot process, operating system detection, and the critical impact of compromising a single sector on your hard disk. Follow along as Raul Alvarez dissects the malicious code overwriting an MBR, demonstrating how it seizes control of the boot process until ransom payment. Gain insights into debugging the MBR to observe native code execution without APIs. Learn about MBR vs. GPT, execution flow, resolving normal malware, Device IO Control API, Physical Drive Zero, and more. Witness a practical demonstration of MBR debugging and understand the implications of boot sector manipulation in this comprehensive exploration of ransomware techniques.

Syllabus

Introduction
About me
Smallpox
MBR vs GPT
GPT
Pecha
Execution flow
Resolving normal malware
Resolving xx section
Device IO Control API
Physical Drive Zero
Winobj
Process Monitor
MBR
Boot Sector Marker
Overwrite MBR
New MBR
Debugging the MBR

Taught by

Hack in Paris

Reviews

Start your review of Dissecting a Ransomware-Infected MBR - Raul Alvarez - Hack in Paris - 2017

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.