YoVDO

Lessons Learned Hunting IoT Malware

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Embedded Systems Courses Reverse Engineering Courses Malware Analysis Courses IoT security Courses Honeypots Courses

Course Description

Overview

Explore the challenges and techniques of hunting IoT malware in this conference talk from 44CON 2017. Delve into the world of embedded device threats as the speaker shares insights on reverse-engineering and tracking malicious code in the Internet of Things ecosystem. Learn about the importance of honeypots in collecting malware samples, and examine proposed IoT honeypot architectures featuring full packet capture, man-in-the-middle frameworks, and emulators. Discover practical solutions to reverse-engineering problems specific to embedded systems, and analyze three real-world cases of embedded malware: Linux/Moose, a stealthy social media botnet; a MIPS architecture ELF binary dropper; and LizardSquad's LizardStresser DDoS malware. Gain valuable knowledge to better equip yourself for hunting next-generation malware using primarily open-source tools.

Syllabus

Lessons Learned Hunting IoT Malware - Olivier Bilodeau at 44CON 2017


Taught by

44CON Information Security Conference

Related Courses

Embedded Systems - Shape The World: Microcontroller Input/Output
The University of Texas at Austin via edX
Model Checking
Chennai Mathematical Institute via Swayam
Introduction to the Internet of Things and Embedded Systems
University of California, Irvine via Coursera
Sistemas embebidos: Aplicaciones con Arduino
Universidad Nacional Autónoma de México via Coursera
Quantitative Formal Modeling and Worst-Case Performance Analysis
EIT Digital via Coursera