YoVDO

The Good Hacker - Dismantling Web Malware

Offered By: LASCON via YouTube

Tags

LASCON Courses Cybersecurity Courses Malware Analysis Courses Web Security Courses

Course Description

Overview

Explore a comprehensive conference talk on dismantling web malware, presented by Aditya K Sood and Richard J Enbody from SecNiche Security Labs and Michigan State University. Delve into the anatomy of malware, its real-world impact, and the underground malware market business. Examine the malware flow model and uncover the truth behind browser vulnerabilities. Learn about browser malware taxonomy, drive-by downloads, and website malware scanning in the cloud. Discover techniques for hunting web malware, including pattern detection and malware domain listing. Gain insights into dissecting traffic dumps, analyzing HTTP/HTTPS traffic, and extracting executables. Conclude with case studies on the Black Hole Exploit Pack and Botnet C&C SQL Injection, providing practical examples of malware dismantling techniques.

Syllabus

The Good Hacker: Dismantling Web Malware
This talk is all about
Anatomy of Malware - Unbearable Truth
Malware - Impact on Real World
Underground Malware - Market Business
Malware Flow Model
Reality of Browsers - Truth Behind the Bars
Browser Malware Taxonomy Class A - Browser Malware
Drive By Downloads - The Evil Reaction Complete Details
Website Malware Scanning - Cloud in Action
Hunting Web Malware
Pattern Detection - Malware Domains Listing
Dissecting Traffic Dumps and Analysis
Extracting Executables from HTTP/HTTPS Traffic
Case Study - Black Hole Exploit Pack - Hunt
Case Study - Botnet C&C SQL Injection


Taught by

LASCON

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy