The Good Hacker - Dismantling Web Malware
Offered By: LASCON via YouTube
Course Description
Overview
Explore a comprehensive conference talk on dismantling web malware, presented by Aditya K Sood and Richard J Enbody from SecNiche Security Labs and Michigan State University. Delve into the anatomy of malware, its real-world impact, and the underground malware market business. Examine the malware flow model and uncover the truth behind browser vulnerabilities. Learn about browser malware taxonomy, drive-by downloads, and website malware scanning in the cloud. Discover techniques for hunting web malware, including pattern detection and malware domain listing. Gain insights into dissecting traffic dumps, analyzing HTTP/HTTPS traffic, and extracting executables. Conclude with case studies on the Black Hole Exploit Pack and Botnet C&C SQL Injection, providing practical examples of malware dismantling techniques.
Syllabus
The Good Hacker: Dismantling Web Malware
This talk is all about
Anatomy of Malware - Unbearable Truth
Malware - Impact on Real World
Underground Malware - Market Business
Malware Flow Model
Reality of Browsers - Truth Behind the Bars
Browser Malware Taxonomy Class A - Browser Malware
Drive By Downloads - The Evil Reaction Complete Details
Website Malware Scanning - Cloud in Action
Hunting Web Malware
Pattern Detection - Malware Domains Listing
Dissecting Traffic Dumps and Analysis
Extracting Executables from HTTP/HTTPS Traffic
Case Study - Black Hole Exploit Pack - Hunt
Case Study - Botnet C&C SQL Injection
Taught by
LASCON
Related Courses
Comparing WAF and RASP - Why?LASCON via YouTube API Security - Is it the New Application Attack Surface and How to Secure at Enterprise Scale
LASCON via YouTube Privacy Impact Assessments - How Much Privacy Is Enough?
LASCON via YouTube Your Frontier Defense - Understanding Web Application Firewalls
LASCON via YouTube Doing This One Crazy Thing Will Change Your AppSec Program Forever
LASCON via YouTube