A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Chicken of the APT: Understanding Targeted Attackers with Incubation! - Kyle Wilhoit Derbycon 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)

Chicken of the APT: Understanding Targeted Attackers with Incubation!
Kyle Wilhoit
Derbycon 2014

Attribution of attackers and motives is often difficult. Trying to understand what tactics they use, malware they utilize, and what groups they belong to can be a tedious task. These attackers are often targeting specific organizations, individuals, and countries, things that sandboxes and dynamic analysis techniques rarely have the ability to emulate. In this talk, we’ll cover targeted malware incubation and present two case studies of never released details on how attackers have fallen victim to incubation. We will finally finish with the release of an open source incubator, Shadowlab, giving everyone the ability to incubate malware.

Back to Derbycon 2014 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast