DEFCON 17: Making Fun of Your Malware
Speakers:
Michael Ligh Malicious Code Analyst, iDefense
Matthew Richard Malicious Code Operations Lead, Raytheon Corporation
Would you laugh if you saw a bank robber accidentally put his mask on backwards and fall into a man hole during the getaway, because he couldn't tell where he was going? Criminals do ridiculous things so often, its impossible to capture them all on video. Rest assured, when the criminals are malware authors, we can still make fun of them through evidence found in pictures, binary disassemblies, packet captures, and log files. This talk evenly distributes technical knowledge and humor to present the funniest discoveries related to malware authors and the fight against their code.
For more information visit: http://bit.ly/defcon17_information
To download the video visit: http://bit.ly/defcon17_videos
Видео DEFCON 17: Making Fun of Your Malware канала Christiaan008
Michael Ligh Malicious Code Analyst, iDefense
Matthew Richard Malicious Code Operations Lead, Raytheon Corporation
Would you laugh if you saw a bank robber accidentally put his mask on backwards and fall into a man hole during the getaway, because he couldn't tell where he was going? Criminals do ridiculous things so often, its impossible to capture them all on video. Rest assured, when the criminals are malware authors, we can still make fun of them through evidence found in pictures, binary disassemblies, packet captures, and log files. This talk evenly distributes technical knowledge and humor to present the funniest discoveries related to malware authors and the fight against their code.
For more information visit: http://bit.ly/defcon17_information
To download the video visit: http://bit.ly/defcon17_videos
Видео DEFCON 17: Making Fun of Your Malware канала Christiaan008
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Writing Bad @$$ Malware For OS XDefcon 21 - Stalking a City for Fun and FrivolityDEF CON 24 - Hunter Scott - RT to Win: 50 lines of Python made me the luckiest guy on TwitterDEFCON 16: Toying with BarcodesPulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA?Behind the Scenes - Neverhood and Skullmonkeys [Making of]Mikko Hypponen: Fighting viruses, defending the netDEF CON 24 - 101 Sentient Storage - Do SSDs Have a Mind of Their Own?Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #GhidraGOD MODE UNLOCKED - Hardware Backdoors in x86 CPUsDEFCON 19: Hacking MMORPGs for Fun and Mostly Profit ( w speaker)You’re Probably Not Red Teaming... And Usually I’m Not, Either [SANS ICS 2018]01 - Skittish and Bus - DEF CON Is CanceledDEF CON 24 - Backdooring the FrontdoorDEFCON 17: Stealing Profits from Spammers or: How I learned to Stop Worrying and Love the SpamI'll Let Myself In: Tactics of Physical Pen TestersNina Kollars - Confessions of an Nespresso Money Mule - DEF CON 27 ConferenceThe Machines That Betrayed Their Masters by Glenn WilkinsonDEFCON 19: The Dark Side of Crime-fighting, Security, and Professional Intelligence48 Dirty Little Secrets Cryptographers Don’t Want You To Know