The Good Hacker - Dismantling Web Malware
Offered By: LASCON via YouTube
Course Description
Overview
Explore a comprehensive conference talk on dismantling web malware, presented by Aditya K Sood and Richard J Enbody from SecNiche Security Labs and Michigan State University. Delve into the anatomy of malware, its real-world impact, and the underground malware market business. Examine the malware flow model and uncover the truth behind browser vulnerabilities. Learn about browser malware taxonomy, drive-by downloads, and website malware scanning in the cloud. Discover techniques for hunting web malware, including pattern detection and malware domain listing. Gain insights into dissecting traffic dumps, analyzing HTTP/HTTPS traffic, and extracting executables. Conclude with case studies on the Black Hole Exploit Pack and Botnet C&C SQL Injection, providing practical examples of malware dismantling techniques.
Syllabus
The Good Hacker: Dismantling Web Malware
This talk is all about
Anatomy of Malware - Unbearable Truth
Malware - Impact on Real World
Underground Malware - Market Business
Malware Flow Model
Reality of Browsers - Truth Behind the Bars
Browser Malware Taxonomy Class A - Browser Malware
Drive By Downloads - The Evil Reaction Complete Details
Website Malware Scanning - Cloud in Action
Hunting Web Malware
Pattern Detection - Malware Domains Listing
Dissecting Traffic Dumps and Analysis
Extracting Executables from HTTP/HTTPS Traffic
Case Study - Black Hole Exploit Pack - Hunt
Case Study - Botnet C&C SQL Injection
Taught by
LASCON
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax Android Malware Analysis - From Zero to Hero
Udemy How to Create and Embed Malware (2-in-1 Course)
Udemy