Top Banner
M.A.C.E. Malware Analysis in a Controlled Environment Michael R. Kobett
6

MACE: Malware Analysis in a Controlled Environment by Michael Kobett

Aug 05, 2015

Download

Technology

EC-Council
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: MACE: Malware Analysis in a Controlled Environment by Michael Kobett

M.A.C.E.Malware Analysis in a

Controlled EnvironmentMichael R. Kobett

Page 2: MACE: Malware Analysis in a Controlled Environment by Michael Kobett

All About Me

• Michael Kobett– [email protected]– Find me on LinkedIn

• Senior Technical Instructor– Defense Cyber Investigations Training Academy

• Network Intrusions – Ethical Hacking – Security +

• Adjunct Instructor– UMUC

• Fundamentals of Networking, Network Security, Ethical Hacking & Mobile Forensics

• Certifications• Net/Sec/CTT+ CEH – ECSA – CISSP – Certified Trainer for CEH

Page 3: MACE: Malware Analysis in a Controlled Environment by Michael Kobett

Agenda

• Current Status of Malware• Malware Analysis in a Controlled Environment• Create a Virus• Static Malware Analysis– Demonstration of tools

• Dynamic Malware Analysis– Demonstration of tools

• Q & A / Discussion

Page 4: MACE: Malware Analysis in a Controlled Environment by Michael Kobett

Current Status of Malware

Page 5: MACE: Malware Analysis in a Controlled Environment by Michael Kobett

Let’s Make A Virus!

Page 6: MACE: Malware Analysis in a Controlled Environment by Michael Kobett

Any Questions?