RATs and IOCs - The Easy Way
Offered By: Security BSides London via YouTube
Course Description
Overview
Explore the world of Remote Access Trojans (RATs) in this 30-minute conference talk from Security BSides London. Delve into the various uses of RATs across the cybersecurity landscape, from novice hackers to advanced persistent threat (APT) actors. Learn about the limitations of dynamic analysis and the advantages of static analysis in extracting RAT configurations. Discover how to leverage tools like Malwareconfig.com to process and analyze RAT configurations, generating valuable threat intelligence such as Snort rules, YARA rules, and Indicators of Compromise (IOCs). Gain insights into creating Python scripts for efficient config extraction and understand how to use this information both offensively and defensively. Explore the future of RAT analysis and the importance of sharing findings with the cybersecurity community.
Syllabus
Intro
What is a RAT
Who Uses RATS: Script Kiddies
Who Uses RATS: APT
Grabbing The Config
Making It Easy Python Scripts
Using The Config: Offensive
Share With The Community
The Future
Taught by
Security BSides London
Related Courses
Early Detection through DeceptionYouTube Hack for Show, Report for Dough - Brian King
YouTube Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube Windows Event Logs - Zero to Hero
YouTube Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube