Dude, Where Are My Files? Reverse Engineering Ransomware
Presented by: Michael Sikorski
Join Michael Sikorski, author of "Practical Malware Analysis", as he introduces you to malware analysis and reverse engineering by dissecting Ransomware. Mike will review some of the most famous ransomware attacks in recent memory such as WannaCry and Petya. In multiple demonstrations, he’ll show exactly how to reverse engineer malware using real-world samples.
Michael Sikorski is an expert in reverse engineering and malware analysis. He is the Senior Director and Founder of the FireEye Labs Advanced Reverse Engineering (FLARE) Team. Mike provides oversight to research projects and manages the analysis process used by the team. He created a series of courses in malware analysis and teaches them to a variety of audiences including the FBI, NSA, and Black Hat. Mike is the co-author of the book "Practical Malware Analysis," which is published by No Starch Press. He came to FireEye through its acquisition of Mandiant, where he worked for seven years. Prior to Mandiant, he worked for MIT Lincoln Laboratory and the National Security Agency. Mike is also an Adjunct Assistant Professor at Columbia University's Department of Computer Science.
Видео Dude, Where Are My Files? Reverse Engineering Ransomware канала Jane Street
Join Michael Sikorski, author of "Practical Malware Analysis", as he introduces you to malware analysis and reverse engineering by dissecting Ransomware. Mike will review some of the most famous ransomware attacks in recent memory such as WannaCry and Petya. In multiple demonstrations, he’ll show exactly how to reverse engineer malware using real-world samples.
Michael Sikorski is an expert in reverse engineering and malware analysis. He is the Senior Director and Founder of the FireEye Labs Advanced Reverse Engineering (FLARE) Team. Mike provides oversight to research projects and manages the analysis process used by the team. He created a series of courses in malware analysis and teaches them to a variety of audiences including the FBI, NSA, and Black Hat. Mike is the co-author of the book "Practical Malware Analysis," which is published by No Starch Press. He came to FireEye through its acquisition of Mandiant, where he worked for seven years. Prior to Mandiant, he worked for MIT Lincoln Laboratory and the National Security Agency. Mike is also an Adjunct Assistant Professor at Columbia University's Department of Computer Science.
Видео Dude, Where Are My Files? Reverse Engineering Ransomware канала Jane Street
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Safe at Any Speed: Building a Performant, Safe, Maintainable Packet Processor](https://i.ytimg.com/vi/BysBMdx9w6k/default.jpg)
![Wana Decrypt0r (Wanacry Ransomware) - Computerphile](https://i.ytimg.com/vi/88jkB1V6N9w/default.jpg)
![Introduction to Malware Analysis](https://i.ytimg.com/vi/f-fMdnUW4X4/default.jpg)
![Reading Silicon: How to Reverse Engineer Integrated Circuits](https://i.ytimg.com/vi/aHx-XUA6f9g/default.jpg)
![Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra](https://i.ytimg.com/vi/Sv8yu12y5zM/default.jpg)
![RustBelt: Logical Foundations for the Future of Safe Systems Programming](https://i.ytimg.com/vi/1GjSfyijaxo/default.jpg)
![The Hurricane's Butterfly: Debugging Pathologically Performing Systems](https://i.ytimg.com/vi/7AO4wz6gI3Q/default.jpg)
![DEMO: The Anatomy of Ransomware](https://i.ytimg.com/vi/aykf0P5Qtb8/default.jpg)
![DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering](https://i.ytimg.com/vi/HlUe0TUHOIc/default.jpg)
![In-depth: ELF - The Extensible & Linkable Format](https://i.ytimg.com/vi/nC1U1LJQL8o/default.jpg)
![Reverse Engineered old Compression Algorithm for Frogger](https://i.ytimg.com/vi/BwoOB2QFXvw/default.jpg)
![Unboxed Types for OCaml](https://i.ytimg.com/vi/RV-4Xddk0Yc/default.jpg)
![Reverse Engineering a Uniden Cordlessphone LCD](https://i.ytimg.com/vi/pbEq4s9UKbo/default.jpg)
![Reverse Engineering WhatsApp Encryption for Chat Manipulation and More](https://i.ytimg.com/vi/N0Ne623fKWc/default.jpg)
![WannaCry Ransomware - Revisited. Behavioural and Static Analysis Techniques](https://i.ytimg.com/vi/AwouoQ802fA/default.jpg)
![IoT Security: Backdooring a smart camera by creating a malicious firmware upgrade](https://i.ytimg.com/vi/hV8W4o-Mu2o/default.jpg)
![The Algorithm for Precision Medicine](https://i.ytimg.com/vi/Rt3XyeFHvt4/default.jpg)
![MMORPG Bot Reverse Engineering and Tracking](https://i.ytimg.com/vi/irhcfHBkfe0/default.jpg)
![Reverse engineering vintage Japanese electronics - a vacuum fluorescent display!](https://i.ytimg.com/vi/cy6o8TrDUFU/default.jpg)
![Seven Implementations of Incremental](https://i.ytimg.com/vi/G6a5G5i4gQU/default.jpg)