filmov
tv
Demystifying Windows Malware Investigations w/ Patterson Cake
Показать описание
🛝 🔗 Webcast Slides –
From multiplate layers of obfuscation to conditional behavior to sandbox avoidance, malware can indeed be complicated.
But ultimately, when a Windows malware event occurs, the most important questions are “if” and “how” it impacted your environment!
In this free one-hour Black Hills Information Security (BHIS) webcast, Patterson Cake - Incident Responder, will discuss a simplified approach and tactical tips for answering those questions when investigating malware events on your Windows endpoints.
///Chapters
0:00 Introduction
3:55 Agenda and schedule
5:12 Win-Mal Investigations
7:32 Malware analysis
11:20 Malware commonalities
12:40 Most common threats (recent)
18:13 Technical possibilities
20:24 Windows malware investigation - artifacts
22:19 Network communications (C2)*
25:01 Disk (“Writable”)*
26:59 Running process (memory)
27:35 Services
28:25 Scheduled tasks
29:05 Running processes [DIFF]
32:34 Windows malware investigation collection
36:04 Win-Mal Investigation - WORKFLOW
46:30 Sandbox Analysis [FINDINGS]
48:08 Win-Mal Investigations [FINDINGS]
49:33 WinMal Technical Possibilities…
53:32 Q&A
Demystifying Windows Malware Investigations w/ Patterson Cake
QBOT Malware Investigation
Demystifying Modern Windows Rootkits
Windows Defender - Demystifying and Bypassing ASR by Understanding the AV's Signatures
DEF CON 31 - Defender Pretender When Windows Defender Updates Become a Security Risk -Bar, Attias
Malware-detection using Hardware Performance Counters
Breaking Dridex Malware
Webinar | Demystifying EDR
Demystifying Azure Defender Once and for All | Azure Security Center webinar
Demystifying Cybersecurity Webinar: With Matthew Schmider
Dissecting Sakula Malware
Windows Event and Logging Demystified: IT Admin Edition
Emotet Malware (Network Forensic with Brim Security)
Dark-Web Forensic Analysis for law Enforcement Agencies #darkweb #investigation #forensics
Process Injection Explained: Windows OS Fundamentals for Cybersecurity | Part 1
AD Forensics with PowerShell McGlone
Infrastructure Chaining Using Microsoft Defender Threat Intelligence
Veni, No Vidi, No Vici: Attacks on ETW Blind EDR Sensors
Windows Kernel Vulnerability Research and Exploitation - Gilad Bakas
1st 3 Windows IR Commands - BHIS Nuggets | John Strand
Decoding NOBELIUM: The hunt for a global threat (Episode 2)
VPN (Virtual Private Network) Explained
Hybrid Identity Threat Investigation Experience
Wk 02 - Introduction to Security
Комментарии