Submit Search
Upload
Analysis Of Adverarial Code - The Role of Malware Kits
•
3 likes
•
2,021 views
Rahul Mohandas
Follow
This is a presentation given at ClubHack 2007
Read less
Read more
Technology
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 40
Recommended
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
SegInfo
Materials Project Validation, Provenance, and Sandboxes by Dan Gunter
Materials Project Validation, Provenance, and Sandboxes by Dan Gunter
Dan Gunter
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Lastline, Inc.
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
TI Safe
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Natraj G
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
Introduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
Recommended
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
SegInfo
Materials Project Validation, Provenance, and Sandboxes by Dan Gunter
Materials Project Validation, Provenance, and Sandboxes by Dan Gunter
Dan Gunter
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Lastline, Inc.
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
TI Safe
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Natraj G
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
Introduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
Malware analysis
Malware analysis
Prakashchand Suthar
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
Rahul Mohandas
Malware classification and detection
Malware classification and detection
Chong-Kuan Chen
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Malachi Jones
H@dfex 2015 malware analysis
H@dfex 2015 malware analysis
Charles Lim
DC612 Day - Hands on Penetration Testing 101
DC612 Day - Hands on Penetration Testing 101
dc612
Android Malware Analysis
Android Malware Analysis
JongWon Kim
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Lastline, Inc.
A Threat Hunter Himself
A Threat Hunter Himself
Sergey Soldatov
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
Rahul Mohandas
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Paul Melson
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
Xavier Ashe
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your Network
EC-Council
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
Priyanka Aash
Windows Threat Hunting
Windows Threat Hunting
GIBIN JOHN
Spo2 t19 spo2-t19
Spo2 t19 spo2-t19
SelectedPresentations
Malware analysis
Malware analysis
xabean
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
guest66dc5f
Rahul - Analysis Of Adversarial Code - ClubHack2007
Rahul - Analysis Of Adversarial Code - ClubHack2007
ClubHack
More Related Content
What's hot
Malware analysis
Malware analysis
Prakashchand Suthar
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
Rahul Mohandas
Malware classification and detection
Malware classification and detection
Chong-Kuan Chen
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Malachi Jones
H@dfex 2015 malware analysis
H@dfex 2015 malware analysis
Charles Lim
DC612 Day - Hands on Penetration Testing 101
DC612 Day - Hands on Penetration Testing 101
dc612
Android Malware Analysis
Android Malware Analysis
JongWon Kim
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Lastline, Inc.
A Threat Hunter Himself
A Threat Hunter Himself
Sergey Soldatov
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
Rahul Mohandas
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Paul Melson
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
Xavier Ashe
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your Network
EC-Council
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
Priyanka Aash
Windows Threat Hunting
Windows Threat Hunting
GIBIN JOHN
Spo2 t19 spo2-t19
Spo2 t19 spo2-t19
SelectedPresentations
Malware analysis
Malware analysis
xabean
What's hot
(20)
Malware analysis
Malware analysis
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
Malware classification and detection
Malware classification and detection
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
H@dfex 2015 malware analysis
H@dfex 2015 malware analysis
DC612 Day - Hands on Penetration Testing 101
DC612 Day - Hands on Penetration Testing 101
Android Malware Analysis
Android Malware Analysis
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
A Threat Hunter Himself
A Threat Hunter Himself
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your Network
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
Windows Threat Hunting
Windows Threat Hunting
Spo2 t19 spo2-t19
Spo2 t19 spo2-t19
Malware analysis
Malware analysis
Similar to Analysis Of Adverarial Code - The Role of Malware Kits
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
guest66dc5f
Rahul - Analysis Of Adversarial Code - ClubHack2007
Rahul - Analysis Of Adversarial Code - ClubHack2007
ClubHack
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security Vulnerabilities
KaashivInfoTech Company
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
Wayne Huang
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Aditya K Sood
Continuing in your role as a human service provider for your local.docx
Continuing in your role as a human service provider for your local.docx
richardnorman90310
Penetration Testing Basics
Penetration Testing Basics
Rick Wanner
vulnerability scanning and reporting tool
vulnerability scanning and reporting tool
Bhagyashri Chalakh
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
Yury Chemerkin
Modern malware and threats
Modern malware and threats
Martin Holovský
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
Bhagyashri Chalakh
T04505103106
T04505103106
IJERA Editor
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Joann Davis
A26001006
A26001006
IJERA Editor
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
IJCSIS Research Publications
Malware Analysis Made Simple
Malware Analysis Made Simple
Paul Melson
Comparative Study of Fileless Ransomware
Comparative Study of Fileless Ransomware
ijtsrd
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
ijcsit
Top 10 Web Vulnerability Scanners
Top 10 Web Vulnerability Scanners
wensheng wei
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
Daniel Liu
Similar to Analysis Of Adverarial Code - The Role of Malware Kits
(20)
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
Rahul - Analysis Of Adversarial Code - ClubHack2007
Rahul - Analysis Of Adversarial Code - ClubHack2007
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security Vulnerabilities
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Continuing in your role as a human service provider for your local.docx
Continuing in your role as a human service provider for your local.docx
Penetration Testing Basics
Penetration Testing Basics
vulnerability scanning and reporting tool
vulnerability scanning and reporting tool
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
Modern malware and threats
Modern malware and threats
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
T04505103106
T04505103106
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
A26001006
A26001006
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Malware Analysis Made Simple
Malware Analysis Made Simple
Comparative Study of Fileless Ransomware
Comparative Study of Fileless Ransomware
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
Top 10 Web Vulnerability Scanners
Top 10 Web Vulnerability Scanners
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
Recently uploaded
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Deepika Singh
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Recently uploaded
(20)
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Analysis Of Adverarial Code - The Role of Malware Kits
1.
Analysis of Adversarial
Code: The role of Malware Kits ! Rahul Mohandas Virus Research Analyst, McAfee Avert Labs - Bangalore December 09, 2007
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Analysis of Adversarial
Code: The role of Malware Kits ! MPACK Architecture
18.
19.
Analysis of Adversarial
Code: The role of Malware Kits ! ICEPACK Architecture
20.
Analysis of Adversarial
Code: The role of Malware Kits ! ICEPACK Control Panel
21.
Analysis of Adversarial
Code: The role of Malware Kits ! Analyzing Obfuscated Code
22.
23.
24.
25.
Analysis of Adversarial
Code: The role of Malware Kits ! IcePack Obfuscated exploit (IE)
26.
Analysis of Adversarial
Code: The role of Malware Kits ! MPack MultiLevel Encoded Decryptor
27.
28.
29.
30.
Analysis of Adversarial
Code: The role of Malware Kits ! How Browser Exploits Work?
31.
32.
33.
34.
35.
Analysis of Adversarial
Code: The role of Malware Kits ! Defining the Vulnerability: LoadAniIcon() Patched
36.
Analysis of Adversarial
Code: The role of Malware Kits ! Defining the Vulnerability: LoadAniIcon() Unpatched
37.
Analysis of Adversarial
Code: The role of Malware Kits ! Exploit
38.
39.
40.