Session

Malware Hunting - Practical Offensive Approach

We’ll walk through the structures of a PDF, analyzing each part of it, demonstrating how Threat Actors work in the inclusion of malicious components in the structures of the file, in addition to demonstrating the collection of IOC(Indicators of Attack)s and how to build IOA(Indicators of Attack).
Developing offensive thinking that it’s the highlight of this training, you’ll be able to create different strategies to send some attacks, and to know how you can deliver that, and so on. Will have the experience of learning to execute several efficiencies and detection tests in your lab environment, bringing the result of the defensive security analysis with an offensive mindset performed some types of the attacks that are used in cybercrime and being able to take practical actions to identify these threats. Understanding how Cyber Kill Chain works, learning Static and Dynamic Analysis of some types of files, and executing your own attacks…

Filipi Pires

Threat Researcher and Cybersecurity Advocate

Espinho, Portugal

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top