A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


The Art of Post-Infection Response and Mitigation - Caleb J. Crable SecureWV 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

The Art of Post-Infection Response and Mitigation
Caleb J. Crable
@dirtywhitehat

SecureWV 2015

In this day and age, we are all [mostly] fully aware how far signature-based antivirus detections go... not very far at all in regard to actual real-time protection. Users will get infected, there are no longer any IF statements in this equation. My focus is the gray area of post-infection and the many different aspects of end-user and incident response frustration that occur after malware has penetrated and done its dirty work to a single system , network, or organization. I will also be covering various malware removal and mitigation techniques, tools of the trade, and general response and prevention guidelines in case this happens to you, and it will.

Caleb (aka chill) is a malware analyst, practicing dirty whitehat, and frequent contributor to the information security community both online and at technology security events including recent talks at

Back to SecureWV 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast