SlideShare a Scribd company logo
M
Ravindo Tower 17th floor
Kebon Sirih No. 75 Central Jakarta 10340 - Indonesia
P: +62 21 3192 5551 / info@idsirtii.or.id
Android Malware Operating System
Id-SIRTII/CC is Indonesia National Computer Emergency Response Team
OUR AIMS
To support a good environment on Internet infrastructure in the country
To improve Internet security and encourage legal e-transactions in Indonesia.
 
Ali Syarief
(Malware Analyst)
Research & Development Dept.
Id-SIRTII/CC
Andre
Nurhanggoro
( Simulation Lab )
Research & Development Dept.
Id-SIRTII/CC
OVERVIEW
e a
t
Ravindo Tower 17th floor
Kebon Sirih No. 75 Central Jakarta 10340 - Indonesia
P: +62 21 3192 5551 / info@idsirtii.or.id
THE EVOLUTION OF MALWARE
Category DESCRIPTION
MALWARE CATEGORY
Ravindo Tower 17th floor
Kebon Sirih No. 75 Central Jakarta 10340 - Indonesia
P: +62 21 3192 5551 / info@idsirtii.or.id / www.idsirtii.or.id
Workflow Lab Malware ID-SIRTII/CC
Why Analysis Malware
Incident ResponseIncident Response
VulnerabilityVulnerability
Attack trends and Threat EvaluationAttack trends and Threat Evaluation
Penetration TestPenetration Test
Computer ForensicsComputer Forensics
Find New signatureFind New signature
ATTACK
AREA
WINDOWS
Surface Analysis
TrIDTrID
CFF
Explorer
CFF
Explorer
BinTextBinText
Runtime Analysis
RegshotRegshot
PE & PMPE & PM
WiresharkWireshark
Static Analysis
OllyDbgOllyDbg
IDA ProIDA Pro
Runtime Analysis
RegshotRegshot
PE & PMPE & PM
WiresharkWireshark
Surface - RUNTIME- Static
DEMOVIDEO
Persentasi Mas Win Tools

More Related Content

What's hot

Wirelurker
WirelurkerWirelurker
Wirelurker
anupriti
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
 
Mobile security
Mobile securityMobile security
Mobile security
Naveen Kumar
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)security
Software Guru
 
Mobile security
Mobile securityMobile security
Mobile security
Mphasis
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
MarketingArrowECS_CZ
 
REVE Antivirus Total Security
REVE Antivirus Total SecurityREVE Antivirus Total Security
REVE Antivirus Total Security
Abhijeet Guha
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
Santosh Satam
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
PrivateWave Italia SpA
 
[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)
Fortifier. IT Company
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
Fabio Pietrosanti
 
Sw assignment week12
Sw assignment week12Sw assignment week12
Sw assignment week12
you-ly05
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
SISA Information Security Pvt.Ltd
 
Mobile security
Mobile securityMobile security
Mobile security
CyberoamAcademy
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 
Developing a Protection Profile for Smart TV
Developing a Protection Profile for Smart TVDeveloping a Protection Profile for Smart TV
Developing a Protection Profile for Smart TV
Seungjoo Kim
 
Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2
Greg Wartes, MCP
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
CAS
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
Emil Tan
 

What's hot (20)

Wirelurker
WirelurkerWirelurker
Wirelurker
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Day - App (In)security
Mobile Day - App (In)securityMobile Day - App (In)security
Mobile Day - App (In)security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
REVE Antivirus Total Security
REVE Antivirus Total SecurityREVE Antivirus Total Security
REVE Antivirus Total Security
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Mobile security - Intense overview
Mobile security - Intense overviewMobile security - Intense overview
Mobile security - Intense overview
 
[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)[Fortifier] Reliable Software Engineering (Daria)
[Fortifier] Reliable Software Engineering (Daria)
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Sw assignment week12
Sw assignment week12Sw assignment week12
Sw assignment week12
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Mobile security
Mobile securityMobile security
Mobile security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Developing a Protection Profile for Smart TV
Developing a Protection Profile for Smart TVDeveloping a Protection Profile for Smart TV
Developing a Protection Profile for Smart TV
 
Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 

Similar to Persentasi Mas Win Tools

Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) Devices
IRJET Journal
 
iSARG Security Group
iSARG Security GroupiSARG Security Group
iSARG Security Group
ankittiwaari
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Amrit Chhetri
 
Down The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security ProfessionalDown The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security Professional
Satria Ady Pradana
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
IRJET Journal
 
NOOSC_Company Profile.pdf
NOOSC_Company Profile.pdfNOOSC_Company Profile.pdf
NOOSC_Company Profile.pdf
Fetri Miftach
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
Raghav Bisht
 
Analysis of web application penetration testing
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testing
Engr Md Yusuf Miah
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdf
cvrlifesciences
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
Daniel Miessler
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
IRJET Journal
 
craw-security-services.pdf
craw-security-services.pdfcraw-security-services.pdf
craw-security-services.pdf
RohitParashar33
 
Top 5 ethical hacking institutes in pune
Top 5 ethical hacking institutes in puneTop 5 ethical hacking institutes in pune
Top 5 ethical hacking institutes in pune
Siya Agarwal
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
CA Technologies
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
Insights success media and technology pvt ltd
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
AdpesolUsi
 
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
Accenture Italia
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation centerUser centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
Sai Chandra Chittuluri
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
PECB
 

Similar to Persentasi Mas Win Tools (20)

Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) Devices
 
iSARG Security Group
iSARG Security GroupiSARG Security Group
iSARG Security Group
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
 
Down The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security ProfessionalDown The Rabbit Hole, From Networker to Security Professional
Down The Rabbit Hole, From Networker to Security Professional
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
NOOSC_Company Profile.pdf
NOOSC_Company Profile.pdfNOOSC_Company Profile.pdf
NOOSC_Company Profile.pdf
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Analysis of web application penetration testing
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testing
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdf
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
 
craw-security-services.pdf
craw-security-services.pdfcraw-security-services.pdf
craw-security-services.pdf
 
Top 5 ethical hacking institutes in pune
Top 5 ethical hacking institutes in puneTop 5 ethical hacking institutes in pune
Top 5 ethical hacking institutes in pune
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation centerUser centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 

Recently uploaded

Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 

Recently uploaded (20)

Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 

Persentasi Mas Win Tools

  • 1. M
  • 2. Ravindo Tower 17th floor Kebon Sirih No. 75 Central Jakarta 10340 - Indonesia P: +62 21 3192 5551 / info@idsirtii.or.id Android Malware Operating System Id-SIRTII/CC is Indonesia National Computer Emergency Response Team OUR AIMS To support a good environment on Internet infrastructure in the country To improve Internet security and encourage legal e-transactions in Indonesia.   Ali Syarief (Malware Analyst) Research & Development Dept. Id-SIRTII/CC Andre Nurhanggoro ( Simulation Lab ) Research & Development Dept. Id-SIRTII/CC
  • 4.
  • 5.
  • 6.
  • 8. Ravindo Tower 17th floor Kebon Sirih No. 75 Central Jakarta 10340 - Indonesia P: +62 21 3192 5551 / info@idsirtii.or.id THE EVOLUTION OF MALWARE
  • 10.
  • 11.
  • 12. Ravindo Tower 17th floor Kebon Sirih No. 75 Central Jakarta 10340 - Indonesia P: +62 21 3192 5551 / info@idsirtii.or.id / www.idsirtii.or.id Workflow Lab Malware ID-SIRTII/CC
  • 13. Why Analysis Malware Incident ResponseIncident Response VulnerabilityVulnerability Attack trends and Threat EvaluationAttack trends and Threat Evaluation Penetration TestPenetration Test Computer ForensicsComputer Forensics Find New signatureFind New signature
  • 15.
  • 16. Surface Analysis TrIDTrID CFF Explorer CFF Explorer BinTextBinText Runtime Analysis RegshotRegshot PE & PMPE & PM WiresharkWireshark Static Analysis OllyDbgOllyDbg IDA ProIDA Pro Runtime Analysis RegshotRegshot PE & PMPE & PM WiresharkWireshark
  • 18.
  • 19.

Editor's Notes

  1. 1. First, because there is no single vetting authority for Android apps (like the Apple App Store is for iOS apps), attackers can bundle malware with apps virtually unchecked. 2. Second, even though each Android app is isolated from other apps and the platform itself via a virtual machine sandbox, a malicious app can be designed to confuse and manipulate device users into granting additional permissions, which an app can then use to pilfer data or conduct other nefarious activities without ever downloading malcode onto the victim’s device.
  2. Good morning members of the jury. It’s great to see you all here, Thank you for coming today I'd like to start by introducing myself. And I will be assisted by my partners here. We are researchers on malware from malware lab Id-SIRTII. Indonesia And today I am here to provide you some exciting information about new OS, which is going to be very beneficial for you in future. Gameover Zeus and Cryptolocker are some of the most well-known pieces of malware that target financial data, but there are many other variants and types of credentials stealing Trojans out there that you need to pay attention to.
  3. 1. First, because there is no single vetting authority for Android apps (like the Apple App Store is for iOS apps), attackers can bundle malware with apps virtually unchecked. 2. Second, even though each Android app is isolated from other apps and the platform itself via a virtual machine sandbox, a malicious app can be designed to confuse and manipulate device users into granting additional permissions, which an app can then use to pilfer data or conduct other nefarious activities without ever downloading malcode onto the victim’s device.
  4. 1. First, because there is no single vetting authority for Android apps (like the Apple App Store is for iOS apps), attackers can bundle malware with apps virtually unchecked. 2. Second, even though each Android app is isolated from other apps and the platform itself via a virtual machine sandbox, a malicious app can be designed to confuse and manipulate device users into granting additional permissions, which an app can then use to pilfer data or conduct other nefarious activities without ever downloading malcode onto the victim’s device.
  5. Cybercriminals are motivated by money. That means your successful business is a target and you need more than a retroactive scanner that cleans up the mess after you’ve been attacked.
  6. Cybercriminals are motivated by money. That means your successful business is a target and you need more than a retroactive scanner that cleans up the mess after you’ve been attacked.
  7. So it is all up to you now. We hope that in the future, AMOS can be distributed, developed and used to protect our data privacy againts malware attacks. The choice is yours….
  8. AMOS is an android malware OS designed to help advanced users to detect and analyze and also remove all types of HiJackers, Malware, Spyware, Adware, Trojans and Worms.
  9. 1. First, because there is no single vetting authority for Android apps (like the Apple App Store is for iOS apps), attackers can bundle malware with apps virtually unchecked. 2. Second, even though each Android app is isolated from other apps and the platform itself via a virtual machine sandbox, a malicious app can be designed to confuse and manipulate device users into granting additional permissions, which an app can then use to pilfer data or conduct other nefarious activities without ever downloading malcode onto the victim’s device.
  10. AMOS is an android malware OS designed to help advanced users to detect and analyze and also remove all types of HiJackers, Malware, Spyware, Adware, Trojans and Worms.
  11. Fact and Figures Consumers in asia pacific will spend $11 billion dealing with security issues created by malware
  12. AMOS uses Xubuntu as the system base and the system design. It is a combination between Ubuntu which is stable and XFCE which is light. AMOS is an open source - android malware OS built in 2013 which is light and effective and particularly used to analyze malware and protect devices from the malware attacks anytime and anywhere.
  13. AMOS is an android malware OS designed to help advanced users to detect and analyze and also remove all types of HiJackers, Malware, Spyware, Adware, Trojans and Worms.
  14. 1. First, because there is no single vetting authority for Android apps (like the Apple App Store is for iOS apps), attackers can bundle malware with apps virtually unchecked. 2. Second, even though each Android app is isolated from other apps and the platform itself via a virtual machine sandbox, a malicious app can be designed to confuse and manipulate device users into granting additional permissions, which an app can then use to pilfer data or conduct other nefarious activities without ever downloading malcode onto the victim’s device.
  15. 1. First, because there is no single vetting authority for Android apps (like the Apple App Store is for iOS apps), attackers can bundle malware with apps virtually unchecked. 2. Second, even though each Android app is isolated from other apps and the platform itself via a virtual machine sandbox, a malicious app can be designed to confuse and manipulate device users into granting additional permissions, which an app can then use to pilfer data or conduct other nefarious activities without ever downloading malcode onto the victim’s device.
  16. AMOS uses Xubuntu as the system base and the system design. It is a combination between Ubuntu which is stable and XFCE which is light. AMOS is an open source - android malware OS built in 2013 which is light and effective and particularly used to analyze malware and protect devices from the malware attacks anytime and anywhere.