A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


Is it EVIL? - Chaoticflaws GrrCON 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

Is it EVIL?
GrrCON 2015

Maybe it was a random blue screen or a weird glitch that just happened to have occurred after viewing a viral video of "Cats on Bicycles Volume 3" but you definitely feel that your machine just got hacked. So, what do you do? Reload and re-install everything? Run anti-virus and call it a day? Or how about we bust out some sexy forensics and find out if there,s some evilness installed on your system because that,s exactly what we are going to do in this talk. This talk will focus on finding evil on a system. I will cover some of the basics of acquiring forensic images for analysis, narrowing down what files are good/evil, some common places malware likes to hide, Malware evasion/persistence/detection techniques, build your own Indications of compromise, scan your network with custom IOCs and do it all using some free tools from the internet (Volatility, Redline, SIFT, Bulk_extractor, Log2Timeline, Autorunsc.exe, dumpit, FTK-Imager, Malwr.com, and many more!). If you have ever been interested in where to even begin to look for Evil running on your system then this talk is for you!

Back to GrrCON 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast