Submit Search
Upload
Malware Analysis Made Simple SecureWorld Expo Detroit
•
6 likes
•
2,595 views
AI-enhanced title
Paul Melson
Follow
"Malware Analysis Made Simple" from SecureWorld Expo Detroit, 11/05/2008
Read less
Read more
Technology
Report
Share
Report
Share
1 of 36
Recommended
Introduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
Malware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's New
Michael Furman
Introduction to foot printing
Introduction to foot printing
CHETAN THAKRE
Introduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
Sam Bowne
Recommended
Introduction to Malware Analysis
Introduction to Malware Analysis
Andrew McNicol
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
Malware analysis, threat intelligence and reverse engineering
Malware analysis, threat intelligence and reverse engineering
bartblaze
Malware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's New
Michael Furman
Introduction to foot printing
Introduction to foot printing
CHETAN THAKRE
Introduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
Sam Bowne
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
Infosec
Malware
Malware
Anoushka Srivastava
Malware Analysis
Malware Analysis
Prashant Gupta
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0
Michael Gough
Metasploit
Metasploit
henelpj
Introduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
Raghav Bisht
Malware Classification and Analysis
Malware Classification and Analysis
Prashant Chopra
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
Windows Threat Hunting
Windows Threat Hunting
GIBIN JOHN
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
PRISMA CSI
Cyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
Digit Oktavianto
Penetration Testing Basics
Penetration Testing Basics
Rick Wanner
Alphorm.com Formation Analyse de Malware 2/2 : Le guide complet
Alphorm.com Formation Analyse de Malware 2/2 : Le guide complet
Alphorm
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
Sam Bowne
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Chris Gates
Security Analyst Workshop - 20190314
Security Analyst Workshop - 20190314
Florian Roth
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
Threat hunting for Beginners
Threat hunting for Beginners
SKMohamedKasim
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
'Malware Analysis' by PP Singh
'Malware Analysis' by PP Singh
Bipin Upadhyay
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
More Related Content
What's hot
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
Infosec
Malware
Malware
Anoushka Srivastava
Malware Analysis
Malware Analysis
Prashant Gupta
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0
Michael Gough
Metasploit
Metasploit
henelpj
Introduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
Raghav Bisht
Malware Classification and Analysis
Malware Classification and Analysis
Prashant Chopra
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
grecsl
Windows Threat Hunting
Windows Threat Hunting
GIBIN JOHN
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Sam Bowne
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
PRISMA CSI
Cyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
Digit Oktavianto
Penetration Testing Basics
Penetration Testing Basics
Rick Wanner
Alphorm.com Formation Analyse de Malware 2/2 : Le guide complet
Alphorm.com Formation Analyse de Malware 2/2 : Le guide complet
Alphorm
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
Sam Bowne
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Chris Gates
Security Analyst Workshop - 20190314
Security Analyst Workshop - 20190314
Florian Roth
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Teymur Kheirkhabarov
Threat hunting for Beginners
Threat hunting for Beginners
SKMohamedKasim
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
What's hot
(20)
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
Malware
Malware
Malware Analysis
Malware Analysis
The top 10 windows logs event id's used v1.0
The top 10 windows logs event id's used v1.0
Metasploit
Metasploit
Introduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
Malware Classification and Analysis
Malware Classification and Analysis
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Windows Threat Hunting
Windows Threat Hunting
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Practical White Hat Hacker Training - Passive Information Gathering(OSINT)
Cyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
Penetration Testing Basics
Penetration Testing Basics
Alphorm.com Formation Analyse de Malware 2/2 : Le guide complet
Alphorm.com Formation Analyse de Malware 2/2 : Le guide complet
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Security Analyst Workshop - 20190314
Security Analyst Workshop - 20190314
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
Threat hunting for Beginners
Threat hunting for Beginners
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Viewers also liked
'Malware Analysis' by PP Singh
'Malware Analysis' by PP Singh
Bipin Upadhyay
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
grecsl
PyTriage: A malware analysis framework
PyTriage: A malware analysis framework
Yashin Mehaboobe
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Sam Bowne
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Lane Huff
CNIT 126 4: A Crash Course in x86 Disassembly
CNIT 126 4: A Crash Course in x86 Disassembly
Sam Bowne
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
Sam Bowne
CNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection Mechanisms
Sam Bowne
CNIT 126 6: Recognizing C Code Constructs in Assembly
CNIT 126 6: Recognizing C Code Constructs in Assembly
Sam Bowne
CNIT 126 8: Debugging
CNIT 126 8: Debugging
Sam Bowne
CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro
Sam Bowne
Practical Malware Analysis Ch12
Practical Malware Analysis Ch12
Sam Bowne
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Sam Bowne
Ch 13: Network Protection Systems
Ch 13: Network Protection Systems
Sam Bowne
Cybersecurity and The Board
Cybersecurity and The Board
Paul Melson
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware Behavior
Sam Bowne
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Sam Bowne
Practical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-Disassembly
Sam Bowne
Client side attacks using PowerShell
Client side attacks using PowerShell
Nikhil Mittal
CNIT 126 9: OllyDbg
CNIT 126 9: OllyDbg
Sam Bowne
Viewers also liked
(20)
'Malware Analysis' by PP Singh
'Malware Analysis' by PP Singh
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
PyTriage: A malware analysis framework
PyTriage: A malware analysis framework
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
Introduction to Dynamic Malware Analysis ...Or am I "Cuckoo for Malware?"
CNIT 126 4: A Crash Course in x86 Disassembly
CNIT 126 4: A Crash Course in x86 Disassembly
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection Mechanisms
CNIT 126 6: Recognizing C Code Constructs in Assembly
CNIT 126 6: Recognizing C Code Constructs in Assembly
CNIT 126 8: Debugging
CNIT 126 8: Debugging
CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro
Practical Malware Analysis Ch12
Practical Malware Analysis Ch12
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Ch 13: Network Protection Systems
Ch 13: Network Protection Systems
Cybersecurity and The Board
Cybersecurity and The Board
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 15: Anti-Disassembly
Practical Malware Analysis: Ch 15: Anti-Disassembly
Client side attacks using PowerShell
Client side attacks using PowerShell
CNIT 126 9: OllyDbg
CNIT 126 9: OllyDbg
Similar to Malware Analysis Made Simple SecureWorld Expo Detroit
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Paul Melson
Security Handbook
Security Handbook
Anthony Hasse
Hacking and its Defence
Hacking and its Defence
Greater Noida Institute Of Technology
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Natraj G
Cybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
TechBiz Forense Digital
DevSecCon Talk: An experiment in agile Threat Modelling
DevSecCon Talk: An experiment in agile Threat Modelling
zeroXten
An experiment in agile threat modelling
An experiment in agile threat modelling
DevSecCon
2600 av evasion_deuce
2600 av evasion_deuce
Db Cooper
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
pauline234567
Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia
Intro2 malwareanalysisshort
Intro2 malwareanalysisshort
Vincent Ohprecio
Modern Malware and Threats
Modern Malware and Threats
MarketingArrowECS_CZ
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
Workshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
Modern malware and threats
Modern malware and threats
Martin Holovský
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk
Hacking
Hacking
rameswara reddy venkat
Hacking
Hacking
Roshan Chaudhary
Security by Weston Hecker
Security by Weston Hecker
EC-Council
Similar to Malware Analysis Made Simple SecureWorld Expo Detroit
(20)
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
Security Handbook
Security Handbook
Hacking and its Defence
Hacking and its Defence
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
Cybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
DevSecCon Talk: An experiment in agile Threat Modelling
DevSecCon Talk: An experiment in agile Threat Modelling
An experiment in agile threat modelling
An experiment in agile threat modelling
2600 av evasion_deuce
2600 av evasion_deuce
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004
Intro2 malwareanalysisshort
Intro2 malwareanalysisshort
Modern Malware and Threats
Modern Malware and Threats
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
Workshop on BackTrack live CD
Workshop on BackTrack live CD
Modern malware and threats
Modern malware and threats
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Hacking
Hacking
Hacking
Hacking
Security by Weston Hecker
Security by Weston Hecker
Recently uploaded
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
Recently uploaded
(20)
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
How to write a Business Continuity Plan
How to write a Business Continuity Plan
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Malware Analysis Made Simple SecureWorld Expo Detroit
1.
Malware Analysis Made
Simple SecureWorld Expo Detroit Wednesday, November 5, 2008 Paul Melson
2.
Security Incident Response
3.
4.
5.
Why Do Malware
Analysis In-House?
6.
7.
Malware Trends
8.
9.
10.
11.
Detection
12.
Anatomy of a
Drive-By Download Dropper Malware Servers More Malware JScript Exploit
13.
14.
15.
16.
17.
18.
Analysis
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
Building Toolkits
30.
31.
32.
Prevention & Recovery
33.
34.
35.
36.
Q & A
Session