YoVDO

Automating Malware Analysis for Threat Intelligence

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Python Courses Malware Analysis Courses Threat Intelligence Courses Neutrinos Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore automated malware analysis techniques for threat intelligence in this 45-minute conference talk from BSides Augusta 2016. Delve into the Lockheed Martin kill chain, learn about tools like Neutrino and Tequila Boom Boom, and discover how to leverage Yara rules, VTI notifications, and the Viper API. Examine command and control structures, identify patterns in malicious activities, and understand pivoting strategies. Gain insights into the world of cybercriminals and coincidences in their operations, while enhancing your ability to detect and respond to emerging threats.

Syllabus

Intro
What is malware analysis
Lockheed Martin kill chain
Automating malware analysis
My research
What does Neutrino do
What is Tequila Boom Boom
Command and Control
Yana Rules
Vti Notification
Python Code
Viper API
The Bad Guys
Coincidences
Multiple Patterns
C2 Clusters
Funsies
Pivoting
Questions


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube