Cybersecurity & Threat Detection
Facebook Twitter LinkedIn

Cybersecurity & Threat Detection

Expert Talk
Thursday, May 14, 2020 14:30—15:30
Location: EIC CAFÉ

Dissecting and Comparing Different Binaries to Malware Analysis

Demonstrate differents kind of structures in the binaries as a PE (header and your sessions) , ELF (header and your sessions), PDF(header/ body/cross-reference table/trailer), explaining how each session works within a binary, what are the techniques used such as packers, obfuscation with JavaScript (PDF) and more, explaning too about some anti-desassembly techniques, demonstrating as a is the action of these malwares and where it would be possible to "include" a malicious code.

By the end of this "talk" it will be clear to everyone, differences in binaries structures, how can the researcher should conduct each of these kind of analyzes, besides of course, it should seek more basic knowledge, with file structures, software architecture and programming language.

Filipi Pires
Filipi Pires
THOR - Threat Hunting Offensive Researcher
Filipe has been working as Principal Security Engineer at Talkdesk, Security Researcher at SenhaSegura and Instructor at Hacker Security, Staff of DEFCON Group São Paulo-Brazil, he has...

tba

Subscribe for updates
Please provide your email address