YoVDO

Dissecting of Non Malicious Artifacts - One IP at a Time

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Data Analysis Courses Cybersecurity Courses Malware Analysis Courses Threat Intelligence Courses

Course Description

Overview

Explore the hidden dangers of online anti-virus aggregation services and sandboxes in this eye-opening BruCON Security Conference talk. Delve into the research conducted by Dani Goland and Ido Naor as they reveal how security solutions meant to protect data can inadvertently expose sensitive information to potential hackers. Learn about the sophisticated Yara rules developed to capture non-malicious artifacts and the creation of an intelligence tool capable of auto-dissecting full datasets. Discover the risks associated with allowing internally installed security products to interact with online scanners, and gain insights into the global implications of this widespread issue. From the research motive and concept to the proof of concept and analysis pipeline, gain a comprehensive understanding of the potential vulnerabilities in current security practices and the importance of reevaluating the use of online malware-scanning services.

Syllabus

Intro
Disclaimer
Research Motive
Research concept
Research Scope
Research Goal
Proof of Concept
Linking The Subjects
Possible Feeds
Yara rules
Collection
General Architecture
Analysis Pipeline
Global Problem


Taught by

BruCON Security Conference

Related Courses

Proactive Computer Security
University of Colorado System via Coursera
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Cyber Threat Intelligence
IBM via Coursera
Security Analyst Fundamentals
IBM via Coursera