DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology CrowdCasts Monthly: Going Beyond the Indicator

1. Going Beyond the Indicator 2. Agenda • Introductions • Typical Attacker TTPs • Case Studies • New Tactics Explained • Hunting and Detecting • Best…

Technology Overview of python misec - 2-2012

1.Overview of PythonFlying made simple without the Nyquil hangover2. Agenda• About me• History of Python• About Python• Python’s uses• Python basics (Python 101)•…

Technology DEEPSEC 2013: Malware Datamining And Attribution

1.Malware Attribution Theory, Code and Result2. Who am I? • Michael Boman, M.A.R.T. project • Have been “playing around” with malware analysis “for a while”•…

Technology 2013 spider extended page table (ept) instrumentation

1.CERIAS Tech Report 2013-5 SPIDER: Stealthy Binary Program Instrumentation and Debugging via Hardware Virtualization by Zhui Deng, Xiangyu Zhang, Dongyan Xu Center for Education…

Technology XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bitdefender and Ravi...

1. www.bitdefender.com8/25/2014• 1Zero-Footprint Guest Memory Introspection from XenXen Project DEVELOPER SUMMITAugust 18th, 2014Mihai DONȚU –Technical Project Manager,…

Documents Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012

1. Hunting and exploiting bugsin kernel drivers Andras Kabai DefCamp 2012 2. Who am IAndras Kabai OSCP, OSCE, OSEE, GPEN, GWAPT, GREM, GXPN, CEH Manager of Deloitte Hungarys…

Internet Cyber threats landscape and defense

1. Cyber Threats: Landscape and Defense Ing. Andrea Garavaglia Andrea Minigozzi, CISSP – OPST ISIS “C. Facchinetti” Castellanza – VA 14 – 04 - 2014 2. Cyber Threats…

Education Malware analysis as a hobby - the short story (lightning talk)

1. Malware Analysis as a Hobby -the short story Michael Boman - Security Consultant/Researcher, Father of 5 2. The manual way 3. DrawbacksTime consumingBoring in the long…

Software Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware

1. Instrumenting Point-of-SaleMalwareA Case Study in Communicating Malware Analysis More EffectivelyWesley McGrewAssistant Research ProfessorMississippi State UniversityDepartment…

Documents Reverse engineering

1. REVERSEENGINEERINGAn Introduction to Cracking Windows Applications Saswat Padhi 3rd Year UG, CSE Hostel 8, IIT Bombay 2. Presentation for STAB Annual Seminar Weekday 2DISCLAIMER•…