Walle produce all series of hydraulic seals,according to category by purpose,including rotary seals, all kinds of O ring(FKM O ring), step seal, glyd ring, oil seal and various of combination seals, gasket, spring energised seals, food machinery seals and so on.
This document provides instructions for installing Cuckoo 0.4.1 on Mac OS X Snow Leopard to analyze malware in a virtual machine environment. It describes installing dependencies like pip, dpkt, and VirtualBox. It also explains how to set up a Windows virtual machine, edit the Cuckoo configuration file to point to the VM, run Cuckoo's agent in the VM, take snapshots of the VM for analysis, and run an example to analyze a sample file.
REMnux tutorial-2: Extraction and decoding of ArtifactsRhydham Joshi
Power point presentation describes about tools and techniques used for extracting and decoding artifacts from malicious files, forensic discipline in handling infected disk-drives and recovering files from infected images.
Slide lists some of the most common tools used for statically analyze Portable Executable(PE) files.
Contents:
REMnux:
Introduction to REMnux
Entropy:
Use of Entropy for malware detection
Un-packing:
UPX
ByteHist
Density Scout
Anomaly Detection:
PEScanner
EXEScan
PEFrame
PEV
Investigation:
Pyew
Bokken
Disassemblers vs Debuggers vs Decompilers:
Commonly used tools
References:
Walle produce all series of hydraulic seals,according to category by purpose,including rotary seals, all kinds of O ring(FKM O ring), step seal, glyd ring, oil seal and various of combination seals, gasket, spring energised seals, food machinery seals and so on.
This document provides instructions for installing Cuckoo 0.4.1 on Mac OS X Snow Leopard to analyze malware in a virtual machine environment. It describes installing dependencies like pip, dpkt, and VirtualBox. It also explains how to set up a Windows virtual machine, edit the Cuckoo configuration file to point to the VM, run Cuckoo's agent in the VM, take snapshots of the VM for analysis, and run an example to analyze a sample file.
REMnux tutorial-2: Extraction and decoding of ArtifactsRhydham Joshi
Power point presentation describes about tools and techniques used for extracting and decoding artifacts from malicious files, forensic discipline in handling infected disk-drives and recovering files from infected images.
Slide lists some of the most common tools used for statically analyze Portable Executable(PE) files.
Contents:
REMnux:
Introduction to REMnux
Entropy:
Use of Entropy for malware detection
Un-packing:
UPX
ByteHist
Density Scout
Anomaly Detection:
PEScanner
EXEScan
PEFrame
PEV
Investigation:
Pyew
Bokken
Disassemblers vs Debuggers vs Decompilers:
Commonly used tools
References:
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documentsRhydham Joshi
This tutorial covers variety of tools and techniques to investigate malicious PDF & Doc documents, detecting and extracting Javascript, shellcodes from them and their analysis.
July Tech Festa 2015にて登壇した際の資料です。
なお後日、小河さんがOpen VASのCLI操作の解説について以下のスライドを追加投稿してくれました!
「フリーでできるセキュリティチェック OpenVAS CLI編」
http://www.slideshare.net/abend_cve_9999_0001/openvas-cli-51048313
REMnux Tutorial-3: Investigation of Malicious PDF & Doc documentsRhydham Joshi
This tutorial covers variety of tools and techniques to investigate malicious PDF & Doc documents, detecting and extracting Javascript, shellcodes from them and their analysis.
July Tech Festa 2015にて登壇した際の資料です。
なお後日、小河さんがOpen VASのCLI操作の解説について以下のスライドを追加投稿してくれました!
「フリーでできるセキュリティチェック OpenVAS CLI編」
http://www.slideshare.net/abend_cve_9999_0001/openvas-cli-51048313