Investigating JAKU Botnet - Analysis and Insights
Offered By: The Cyber Academy via YouTube
Course Description
Overview
Dive into an in-depth analysis of the JAKU Botnet in this 32-minute conference talk by Andrew Settle from Forcepoint. Explore the collaborative efforts of the Special Investigation Team and their use of big data techniques to uncover crucial insights. Learn about the SQLite database structure, command analysis, and the intricacies of victim targeting. Examine the botnet's geographical spread, dwell times, and unusual characteristics such as large PNG files and UDT communication. Gain valuable knowledge about the botnet's command and control infrastructure, and review its source code. Conclude with a summary of key findings and participate in a Q&A session to deepen your understanding of this sophisticated cyber threat.
Syllabus
Intro
Forcepoint
Special Investigation Team
Collaboration
Big Data
Looking at Other Peoples Data
SQLite Database
Database Documentation
Commands
The complicated bit
Location
Victims
Aggregation
Targeting
dwell time
strange things
large PNG
UDT
Commander Control
Source Code
Summary
Questions
Insights
Taught by
The Cyber Academy
Related Courses
Cyber Threat IntelligenceIBM via Coursera Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning The Future of Network Security and Defence
Coventry University via FutureLearn Data Collection and Processing (CTIA Prep)
Pluralsight