Submit Search
Upload
Analysis Of Adverarial Code - The Role of Malware Kits
•
3 likes
•
2,021 views
Rahul Mohandas
Follow
This is a presentation given at ClubHack 2007
Read less
Read more
Technology
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 40
Recommended
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
SegInfo
Materials Project Validation, Provenance, and Sandboxes by Dan Gunter
Materials Project Validation, Provenance, and Sandboxes by Dan Gunter
Dan Gunter
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Lastline, Inc.
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
TI Safe
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Natraj G
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
Introduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
Recommended
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
SegInfo
Materials Project Validation, Provenance, and Sandboxes by Dan Gunter
Materials Project Validation, Provenance, and Sandboxes by Dan Gunter
Dan Gunter
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evas...
Lastline, Inc.
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
TI Safe
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Natraj G
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
Introduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
Malware analysis
Malware analysis
Prakashchand Suthar
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
Rahul Mohandas
Malware classification and detection
Malware classification and detection
Chong-Kuan Chen
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Malachi Jones
H@dfex 2015 malware analysis
H@dfex 2015 malware analysis
Charles Lim
DC612 Day - Hands on Penetration Testing 101
DC612 Day - Hands on Penetration Testing 101
dc612
Android Malware Analysis
Android Malware Analysis
JongWon Kim
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Lastline, Inc.
A Threat Hunter Himself
A Threat Hunter Himself
Sergey Soldatov
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
Rahul Mohandas
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Paul Melson
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
Xavier Ashe
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your Network
EC-Council
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
Priyanka Aash
Windows Threat Hunting
Windows Threat Hunting
GIBIN JOHN
Spo2 t19 spo2-t19
Spo2 t19 spo2-t19
SelectedPresentations
Malware analysis
Malware analysis
xabean
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
guest66dc5f
Rahul - Analysis Of Adversarial Code - ClubHack2007
Rahul - Analysis Of Adversarial Code - ClubHack2007
ClubHack
More Related Content
What's hot
Malware analysis
Malware analysis
Prakashchand Suthar
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
Rahul Mohandas
Malware classification and detection
Malware classification and detection
Chong-Kuan Chen
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Malachi Jones
H@dfex 2015 malware analysis
H@dfex 2015 malware analysis
Charles Lim
DC612 Day - Hands on Penetration Testing 101
DC612 Day - Hands on Penetration Testing 101
dc612
Android Malware Analysis
Android Malware Analysis
JongWon Kim
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Lastline, Inc.
A Threat Hunter Himself
A Threat Hunter Himself
Sergey Soldatov
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
Rahul Mohandas
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Paul Melson
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
Xavier Ashe
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
Er Vivek Rana
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
Priyanka Aash
Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your Network
EC-Council
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
Priyanka Aash
Windows Threat Hunting
Windows Threat Hunting
GIBIN JOHN
Spo2 t19 spo2-t19
Spo2 t19 spo2-t19
SelectedPresentations
Malware analysis
Malware analysis
xabean
What's hot
(20)
Malware analysis
Malware analysis
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
Malware classification and detection
Malware classification and detection
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
H@dfex 2015 malware analysis
H@dfex 2015 malware analysis
DC612 Day - Hands on Penetration Testing 101
DC612 Day - Hands on Penetration Testing 101
Android Malware Analysis
Android Malware Analysis
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
A Threat Hunter Himself
A Threat Hunter Himself
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your Network
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
Windows Threat Hunting
Windows Threat Hunting
Spo2 t19 spo2-t19
Spo2 t19 spo2-t19
Malware analysis
Malware analysis
Similar to Analysis Of Adverarial Code - The Role of Malware Kits
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
guest66dc5f
Rahul - Analysis Of Adversarial Code - ClubHack2007
Rahul - Analysis Of Adversarial Code - ClubHack2007
ClubHack
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security Vulnerabilities
KaashivInfoTech Company
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
Wayne Huang
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Aditya K Sood
Continuing in your role as a human service provider for your local.docx
Continuing in your role as a human service provider for your local.docx
richardnorman90310
Penetration Testing Basics
Penetration Testing Basics
Rick Wanner
vulnerability scanning and reporting tool
vulnerability scanning and reporting tool
Bhagyashri Chalakh
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
Yury Chemerkin
Modern malware and threats
Modern malware and threats
Martin Holovský
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
Bhagyashri Chalakh
T04505103106
T04505103106
IJERA Editor
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Joann Davis
A26001006
A26001006
IJERA Editor
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
IJCSIS Research Publications
Malware Analysis Made Simple
Malware Analysis Made Simple
Paul Melson
Comparative Study of Fileless Ransomware
Comparative Study of Fileless Ransomware
ijtsrd
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
ijcsit
Top 10 Web Vulnerability Scanners
Top 10 Web Vulnerability Scanners
wensheng wei
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
Daniel Liu
Similar to Analysis Of Adverarial Code - The Role of Malware Kits
(20)
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
Rahul - Analysis Of Adversarial Code - ClubHack2007
Rahul - Analysis Of Adversarial Code - ClubHack2007
Analysis of Field Data on Web Security Vulnerabilities
Analysis of Field Data on Web Security Vulnerabilities
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Continuing in your role as a human service provider for your local.docx
Continuing in your role as a human service provider for your local.docx
Penetration Testing Basics
Penetration Testing Basics
vulnerability scanning and reporting tool
vulnerability scanning and reporting tool
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
Modern malware and threats
Modern malware and threats
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
T04505103106
T04505103106
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
A26001006
A26001006
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Detecting Windows Operating System’s Ransomware based on Statistical Analysis...
Malware Analysis Made Simple
Malware Analysis Made Simple
Comparative Study of Fileless Ransomware
Comparative Study of Fileless Ransomware
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
Top 10 Web Vulnerability Scanners
Top 10 Web Vulnerability Scanners
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
Recently uploaded
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Evaluating the top large language models.pdf
Evaluating the top large language models.pdf
ChristopherTHyatt
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Recently uploaded
(20)
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Evaluating the top large language models.pdf
Evaluating the top large language models.pdf
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Analysis Of Adverarial Code - The Role of Malware Kits
1.
Analysis of Adversarial
Code: The role of Malware Kits ! Rahul Mohandas Virus Research Analyst, McAfee Avert Labs - Bangalore December 09, 2007
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Analysis of Adversarial
Code: The role of Malware Kits ! MPACK Architecture
18.
19.
Analysis of Adversarial
Code: The role of Malware Kits ! ICEPACK Architecture
20.
Analysis of Adversarial
Code: The role of Malware Kits ! ICEPACK Control Panel
21.
Analysis of Adversarial
Code: The role of Malware Kits ! Analyzing Obfuscated Code
22.
23.
24.
25.
Analysis of Adversarial
Code: The role of Malware Kits ! IcePack Obfuscated exploit (IE)
26.
Analysis of Adversarial
Code: The role of Malware Kits ! MPack MultiLevel Encoded Decryptor
27.
28.
29.
30.
Analysis of Adversarial
Code: The role of Malware Kits ! How Browser Exploits Work?
31.
32.
33.
34.
35.
Analysis of Adversarial
Code: The role of Malware Kits ! Defining the Vulnerability: LoadAniIcon() Patched
36.
Analysis of Adversarial
Code: The role of Malware Kits ! Defining the Vulnerability: LoadAniIcon() Unpatched
37.
Analysis of Adversarial
Code: The role of Malware Kits ! Exploit
38.
39.
40.