Examining a Java Zero-Day Exploit

preview_player
Показать описание
[For higher-resolution video playback, please select 720p or 1080p with the change quality (cog) button.]
In this video, we examine the first big Java Zero-Day Exploit of 2013 using the FireAMP Advanced Malware Protection management console. In this demonstration, a test system running both a FireAMP connector and a fully patched and up-to-date version of Java connects to a server that contains the exploit code. Once the exploit succeeds, the well-known ZeroAccess Trojan is dropped onto the system. Video by Dr. Zulfikar Ramzan, Sourcefire's Chief Scientist in Sourcefire's Cloud Technology Group.
Рекомендации по теме
Комментарии
Автор

I stumbled across this video and would like to know what tool you're using to analyze this malicious activity? Is it fire amp?

Cee_Nelly
Автор

CNelsonMSIA - yes, FireAMP is the product used.

TomStuart