Session:Experience in dissecting malware
From 34C3_Wiki
Description | Sharing some results from dissecting and re-implementing a rootkit. Aim was and is to understand the decisions of the orginal authors. Work is based on a re-implementation of a well-known implant. Previous Experience in Reversing Malware strongly recommended. Bring a Win7x64 system and IDA Pro. |
---|---|
Website(s) | |
Type | Workshop |
Kids session | No |
Keyword(s) | security |
Tags | Reverse Engineering, Malware, Security |
Processing assembly | Assembly:European CERTs and CSIRTs |
Person organizing | |
Language | de - German |
Other sessions... |
Subtitle | This driver is not one of ours. |
---|---|
Starts at | 2017/12/29 22:00 |
Ends at | 2017/12/29 23:30 |
Duration | 90 minutes |
Location | Room:Seminar room 13 |
Based on a re-implementation of a well-known rootkit used by bad guys, we try to deduct some of the decisions the authors made when implementing it. Experience with IDA Pro is required. A working Win7x64 vulnbox is required.