Quick and Dirty Malware Analysis for the Rest of Us

Presented at BSides Austin 2018, March 8, 2018, 11 a.m. (60 minutes).

Have you ever been under attack by an APT group using new malware families and novel techniques that security vendors have never been seen before? Having the ability to quickly perform your own malware analysis can be the difference between being in business and going out of business. In this talk I'll share some of what I've learned from dealing with this very scenario over the last several years. I'll give you actionable information on how to build your own mini malware lab and perform quick and dirty malware analysis so that you can better prepare, defend and respond to attacks against your environment. You won't need years of experience in Intel architecture or expensive training. Everyone who attends will be able to walk away from this talk and start building their own lab tomorrow. I'll also be releasing a new tool that will help make this easier than it has ever been before.

Presenters:

  • Ian Robertson
    Ian Robertson has over [mumble] years of experience in the security industry, ranging from engineer, architect, pentester, software developer, CISO and just about everything in between. He holds a Bachelor's of Science in IT Security, and is nearing completion of his Master's degree in Cyber Security and Information Assurance from Western Governors University. He's been featured in CSO Magazine, Engadget, PC Magazine, Popular Science and PaulDotCom, and has presented previously at DerbyCon, LASCON and here at BSides. He has earned 14 industry certifications, including the CISSP, GIAC GREM (Reverse Engineering Malware) and Certified Ethical Hacker.

Links:

Similar Presentations: