![]() |
||||||||||
Team Cymru Security Workshop – Understanding, Identifying and Investigating Malicious Internet Activity through Malware Analysis (21 – 22 Nov@Cyberport) |
||||||||||
Registration: Click HereTRAINING SUMMARYI. Botnet Creation, Operation and Observation
II. Malware Analysis In this component methods for both static and dynamic analysis will be considered and relevant tools for malware analysis employed. Tools, including Volatility, IDA Pro, Ollydbg and Sandboxie will be demonstrated III. Network Forensics Using Netflow and Pcap Traffic Analysis In this section participants will consider how Netflow and Internet traffic analysis can be used in a forensic examination of malicious activity on the Internet. The nature of network flows, what they are, how they are generated and collected and how they can be analysed will be discussed. OUTLINE This workshop will focus on understanding the operation and nature of malicious Internet activity by following the life cycle of a piece of malware including its creation and use in compromising a target victim machine, making that victim part of a botnet, the operation and use of that botnet, the observation and identification of the malware, its capture, exfiltration and subsequent analysis. In the analysis, host-based processes will be used to identify and locate the malware and on examining how this can provide clues and information to assist in tracking a botnet through network based analysis. To conduct an Internet forensic examination, participants will capture the traffic generated by the activities conducted in part I and will be able to examine this traffic using both pcaps and flows to observe, identify and forensically analyse the traffic, and so relate the results of the analysis with the operations they initially conducted with the botnet. |