- 1、本文档共30页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
《25-ThomasChopiteaMalcon》.pdf
WHEN T HE HUNT ER
BECOMES T HE HUNT ED
HUNT ING DOWN BOT NETS USING NETWORK T RA FFIC
A NA LYSIS
/ABOUT/ ME
Thomas Chopitea - Incident handler @CertSG
Digital forensics incident response (#DFIR), malware
analysis, recent member of the Honeynet Project
Twitter: @tomchop_
Blog: http://tomchop.me/
Also: were hiring !
/joinusnow !.html
/ABOUT/T HETALK
Common IR problems
What is Malcom and how it leverages network traffic analysis
and OSINT to solve them
Malcom vs. botnets (demos, yay !)
How you can use Malcom to deal with these problems
How you can help Malcom grow stronger
I HAV E A LOT OF
PROBLEMS
PPRROOBBLLEEMM ##11
KKIILLLL TTHHEE MMAALLWWAARREE
PROBLEM #1: KILL T HE MALWARE
I need to:
Enumerate domain names / IP addresses
Identify resources (gates, dropzones, configs, etc.)
Gather exchanged data (Configuration files? Stolen data?)
PROBLEM #1: KILL T HE MALWARE
So I can:
Alert the owners of stolen info send takedown requests
Build threat intelligence (so that I can refer to it later)
Start incident remediation
NNOOTT SSUURREE IIFF CCRRIITTIICCAALL
PPRROOBBLLEEMM ##22
OORR JJUUSSTT AANNOOTTHHEERR SSTTRRAAIINN OOFF
ZZEEUUSS
PROBLEM #2: WT F IS T HIS?
Sure, I could:
Do an antivirus scan on it and get Troj/Gen Suspicious
Reverse engineer it (3 samples a day? yeah right)
Obvs: run it in a sandbox and do some behavioral analysis
x-ref network artifacts against public blacklists
PROBLEM #3
I NEED T O DO IT FAST
(cause incidents keep popping up)
PROBLEM #3: GOGOGO
Dont want : start Wireshark, text editor, snort, tcpflow,
foremost, etc.
Want : Drop my malware in a VM, and quickly know:
您可能关注的文档
- 《04_Web测试自动化_20160720》.pdf
- 《05 Interaction of A Cavitation Bubble and An Air Bubble with a Rigid Boundary 》.pdf
- 《07Catalog-accessories》.pdf
- 《09 The counter jet formation in an air bubble induced by the impact of shock waves》.pdf
- 《09老子道德经注(魏&王弼撰)》.pdf
- 《1 ANSYS分析过程》.pdf
- 《1-2 Words and Phrases Related to Air Travel》.ppt
- 《1-Air&CompressedAir-FundamentalTraining》.ppt
- 《1.0.InduSoft Web Studio V7.1体验-宜宾机电一体化-李卫》.pdf
- 《1.金宇传媒&互联网行业培训-分析框架和投资逻辑20160905(28页)》.ppt
- 2019高考总复习第一轮复习语文课件第四部分古代诗文阅读专题一文言文阅读7高考命题点一.ppt
- 河南省三门峡市2024-2025学年度下学期期末调研考试高一物理试题.docx
- 2018-2019学年高中一轮复习物理课件第十章第3节传感器及其应用.ppt
- 第三单元走向未来的少年(课件) 2024-2025学年统编版道德与法治九年级下册.pptx
- 第一单元我们共同的世界(课件) 2024-2025学年统编版道德与法治九年级下册.pptx
- 6.1学无止境(课件) 2024-2025学年统编版道德与法治九年级下册.pptx
- 2.1 推动和平与发展(课件) 2024-2025学年统编版道德与法治九年级下册.pptx
- 4.2 携手促发展 (课件) 2024-2025学年统编版道德与法治九年级下册.pptx
- 6.2多彩的职业(课件) 2024-2025学年统编版道德与法治九年级下册.pptx
- 第二单元 世界舞台上的中国(课件) 2024-2025学年统编版道德与法治九年级下册.pptx
文档评论(0)