YoVDO

When Crypto Fails

Offered By: Cooper via YouTube

Tags

Hack.lu Courses Cybersecurity Courses Cryptography Courses Malware Analysis Courses

Course Description

Overview

Explore the world of cryptographic failures in malware through this enlightening conference talk from Hack.lu 2016. Delve into real-world examples of poorly implemented cryptography in various malware strains, including ransomware. Learn to identify common pitfalls and potentially exploit these weaknesses to subvert malicious intent. Gain insights into voodoo programming, Jedi mind tricks, the Linux Encoder, copy-and-paste errors, misuse of Windows Native Crypto API, and the Petya ransomware. Discover techniques for triaging encrypted files and understand the broader implications of cryptographic disasters in cybersecurity. Conclude with valuable takeaways and access to a specially designed tool for analyzing encrypted files.

Syllabus

Introduction
Voodoo Programming
Jedi Mind Trick
Linux Encoder
Copy and Paste
Using the Windows Native Crypto API
Petya Ransomware
Takeaways


Taught by

Cooper

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network