filmov
tv
Tutorial: Hunting Linux malware for fun and $flags

Показать описание
Marc-Etienne M.Léveillé
Server-side Linux malware is a real threat now. Unfortunately, as for its Windows counterpart, most system administrators are inadequately trained or don't have enough time allocated by their management to analyze and understand the threats that their infrastructures are facing. This tutorial aims at creating an environment where Linux professionals have the opportunity to study such threats safely and in a time-effective fashion.
In this introductory tutorial you will learn to fight real-world Linux malware that targets server environments. Attendees will have to find malicious processes and concealed backdoors in a compromised Web server.
In order to make the tutorial accessible for a range of skill levels several examples of malware will be used with increasing layers of complexity -- from scripts to ELF binaries with varying degrees of obfuscation. Additionally, as is common in Capture-The-Flag information security competitions, flags will be hidden throughout the environment for attendees to find.
Requirements
* Some programming experience
* Good understanding of Linux server systems (userland)
* Pre-installed tools: text-editor, radare2, gdb
* Optional: ipython, IDA Pro (proprietary)
Skills to acquire
* Live system incident response and forensics using Linux's standard tools
* System hardening
* Introduction to reverse-engineering obfuscated scripts and binaries
Server-side Linux malware is a real threat now. Unfortunately, as for its Windows counterpart, most system administrators are inadequately trained or don't have enough time allocated by their management to analyze and understand the threats that their infrastructures are facing. This tutorial aims at creating an environment where Linux professionals have the opportunity to study such threats safely and in a time-effective fashion.
In this introductory tutorial you will learn to fight real-world Linux malware that targets server environments. Attendees will have to find malicious processes and concealed backdoors in a compromised Web server.
In order to make the tutorial accessible for a range of skill levels several examples of malware will be used with increasing layers of complexity -- from scripts to ELF binaries with varying degrees of obfuscation. Additionally, as is common in Capture-The-Flag information security competitions, flags will be hidden throughout the environment for attendees to find.
Requirements
* Some programming experience
* Good understanding of Linux server systems (userland)
* Pre-installed tools: text-editor, radare2, gdb
* Optional: ipython, IDA Pro (proprietary)
Skills to acquire
* Live system incident response and forensics using Linux's standard tools
* System hardening
* Introduction to reverse-engineering obfuscated scripts and binaries
Комментарии