YoVDO

Crypto Gone Rogue - A Tale of Ransomware, Key Management, and the CryptoAPI

Offered By: YouTube

Tags

GrrCon Courses Cybersecurity Courses Cryptography Courses Ransomware Courses Key Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the evolution of ransomware key management and its interaction with the Windows CryptoAPI in this 26-minute conference talk from GrrCon 2018. Delve into the necessary elements of ransomware, the importance of key management, and its progression over time. Examine the relationship between Windows, ransomware, and the native CryptoAPI, using NotPetya as a case study. Learn about crucial CryptoAPI calls, including CryptAcquireContext, CryptEncrypt, CryptImportKey, CryptDestroy, and CryptReleaseContext. Gain insights into ransomware design and draw valuable conclusions about the intersection of cryptography and malicious software.

Syllabus

Intro
Necessary Elements of a Ransomware
Why Key Management?
Evolution of Key Management
The Windows
Ransomware and the
Why Use the Native
NotPetya Ransom Message
List of Imports
CryptoAPI Calls
CryptAcquire Context
CryptEncrypt
CryptimportKey
CryptDestroy
CryptRelease Context
Ransomware Design
Conclusion


Related Courses

Dance Fancybear Dance - A Study in macOS Cat Self
YouTube
Big Plane Little Plane - How Common Aviation Attacks Affect Airlines and General Aviation
YouTube
Network Exploitation of IoT Ecosystems
YouTube
Inhumane - Making Security Hard on Criminals, Easy on Everyone Else
YouTube
Deepfakes - If Anything Can Be Real, Then Nothing Is Real
YouTube