The state of spam in 2015
The state of spam in 2015 Botconf 2015 Lightning talks Martijn Grooten 🗣 Edit PDF
The state of spam in 2015 Read More »
The state of spam in 2015 Botconf 2015 Lightning talks Martijn Grooten 🗣 Edit PDF
The state of spam in 2015 Read More »
Python log parser – Flask Log Map Botconf 2015 Lightning talks Hugo Rifflet 🗣 Edit PDF
Python log parser – Flask Log Map Read More »
Dynamic symbolic execution for malware reverse-engineering Botconf 2015 Lightning talks Robin David 🗣 Edit PDF
Dynamic symbolic execution for malware reverse-engineering Read More »
Cymon.io – Open threat intelligence for fighting botnets Botconf 2015 Lightning talks Roy Firestein 🗣 External link: Project website Edit PDF
Cymon.io – Open threat intelligence for fighting botnets Read More »
Automatic MIME attachments triage Botconf 2015 Lightning talks Xavier Mertens 🗣 Edit PDF
Automatic MIME attachments triage Read More »
Wrestling elephants: Tackling malware research issues (The Name Game) Botconf 2015 Lightning talks Wayne Crowder 🗣 Edit PDF
Wrestling elephants: Tackling malware research issues (The Name Game) Read More »
The story of Cryptowall: a historical analysis of a large scale cryptographic ransomware threat Botconf 2015 Friday | 09:30 – 10:00 Yonathan Klijnsma 🗣 For almost two years Cryptowall has been making its rounds encrypting the files of victims and extorting them for money in the form of Bitcoins. Following in the footsteps of Cryptolocker
Powered by JavaScript Botconf 2015 Friday | 10:00 – 10:30 Renaud Bidou 🗣 Current capabilities of JavaScript turns the browser into the perfect host for a botnet agent. It can be compromised through different vectors, offers a wide range of functionalities, provides persistence and storage, communicates freely with many C&C channels, and behaves like a
Powered by JavaScript Read More »
Inside DarkComet: a wild case-study Botconf 2015 Friday | 11:00 – 11:50 Jeremy du Bruyn 🗣 This research discusses the application of a framework for the automated analysis of malware samples, specifically botnet binaries, which automates the collection, analysis, and infiltration of botnets. Due to the increased number of samples released daily, such frameworks have
Inside DarkComet: a wild case-study Read More »
Air-gap limitations and bypass techniques: “command and control” using Smart Electromagnetic Interferences Botconf 2015 Friday | 11:50 – 12:30 Chaouki Kasmi 🗣 | José Lopes Esteves 🗣 | Philippe Valembois 🗣 Air gaps are generally considered to be a very efficient information security protection. However, this technique also showed limitations, involving finding covert channels for bridging the air gap.