Malware : testing malware scenarios on your network

Presented at DerbyCon 3.0 All in the Family (2013), Sept. 27, 2013, 1 p.m. (50 minutes).

People get Penetration tests and vulnerability assessments to find if they have vulnerabilities that would allow an attacker to access their network but often attackers are getting in ways that penetration testers are unable to test for. The purpose of this talk is to try to introduce and encourage a different kind of security test on a network, malware and backdoors. We plan to showing a demo on how to perform this type of test, give advice from our experiences reversing malware and demo our malware library we have created that could be used to perform these type of tests.


Presenters:

  • Tony Huffman (@myne_us)
    Tony Huffman (@myne_us) is a Sr. Reverse Engineer at Tenable Network Security where he spends most his time working on the research for the Nessus product. He has a primary focus in the malware and exploitation section of security where he investigates some of the latest threats and techniques and writing and maintaining a malware code library for fun. When he not working on computers he enjoys being a dad and reading about physics.
  • Juan Cortes (@kongo_86)
    Juan (@kongo_86) is a security researcher at Tenable Network Security where he his main job is to produce plugins for Tenable’s Passive Vulnerability Scanner. Outside of work he loves to Reverse Engineer malware and studying its techniques, as well as practice the detection via memory forensics. He expresses himself as “student”, always learning and is thankful for the community that he is par of.

Similar Presentations: