YoVDO

To Catch a Spy - Tyler Hudak

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Digital Forensics Courses Threat Detection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for detecting and analyzing sophisticated malware and espionage tools in this 49-minute conference talk from Derbycon 7. Delve into topics such as the Vault7 "Year Zero" Wikileaks dump, IFEO and Sticky Keys backdoors, registry auditing, and Windows shell extensions. Learn about malicious persistence methods, forensic examination techniques, and DLL search order exploitation. Examine Windows boot sequence vulnerabilities, bootkits, and process hollowing. Gain insights into detection methods using tools like Volatility and discover valuable resources for further investigation into cyber espionage tactics.

Syllabus

Intro
Vault7 "Year Zero" Wikileaks Dump
Prerequisites
IFEO
Sticky Keys Backdoor
Logging - Registry Auditing
Windows Shell
Registering an Extension
Shell Extension Persistence
Malicious Extension
HKCR with HKCU Extensions
Forensic Examination
DLL Search Order
Exploitation
Detection - Examine Loaded DLLs
Windows Boot Sequence
Bootkit
Carperb Capabilities
VBR Verification
Hollowing
Advantages
Detection - Volatility - hollowfind
Resources


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube