TECH TRAINING 7 – ADVANCED MALCODE THREAT ANALYSIS
TRAINER: Dr. Jose Nazario (Arbor Networks) |
CAPACITY: 20 pax |
SEATS LEFT: REGISTRATION CLOSED
|
DURATION: 2 days (8th & 9th October 2012) |
COST (per pax): MYR3999 (early bird) / MYR4999 (non early-bird) |
OVERVIEW
As the pace of challenges facing every network – and the people who have to defend them – grows, the need for more comprehensive information grows with it. When you can’t wait for AV firms and IPS vendors to provide a remedy on your timescale, you need to take matters into your own hands: “I need to protect the network, but I don’t have a lot of time or resources.”
This course is designed for information security professionals and enthusiasts who are tasked with protecting networks and businesses from a broad range of threats. This course will also suit people who are interested in learning more about the current Internet threat landscape. Students will learn how to identify new threats to their own networks and the internet at large, and how to protect against them.
Rather than focusing on reverse engineering and malcode dissection, we will instead focus on a simple approach that many people can use to quickly gather specific, usable information about threats. This course is not designed to be tool specific but rather it discusses a broad approach and multiple techniques that can be used quickly to assess new threats and determine how to respond to them. This class focuses on open, freely available tools to facilitate analysis. No programming or networking experience is required, but some operational experience is expected in order to get the most out of the training.
At the end of the two-day session, you should be able to
* Detect new malware and quickly gather information about it
* Identify malicious websites and discover their attack vectors
* Identify and react to phishing attacks
* Analyze vulnerability reports and translate this into a defensive posture
* Analyze exploit code to determine how to defend against it
* Build a knowledge repository for yourself and your team
WHO SHOULD ATTEND
* Network security staff
* System administrators
* People interested in learning about malcode and threats
PREREQUISITES
* Decent knowledge of TCP/IP
* Decent knowledge of Windows systems and major APIs
* Participants should bring their own laptop (VMWare system optional but not a bad idea)
* Choice of Operating System is optional (either Windows, OSX, or Linux)
- While we handle malicious artifacts, you’ll want to make sure you don’t get infected
AGENDA
Day 1
i.) New malware analysis and response
ii.) Thinking like an analyst
iii.) WHOIS and DNS investigations
iv.) Analyzing software vulnerability reports
v.) Malicious and drive-by websites
Day 2
i.) Analyzing exploit code
ii.) Malware analysis advanced topics
iii.) Detecting scans and probes
WHAT TO BRING:
A working laptop with the following hardware/software requirements:
Hardware Requirements
-
Intel 64-bit machine.
Hardware must be able to run a 64-bit VM
If you can only get an Intel 32-bit machine you will still be able to do 85% of the labs, so don’t fret.
-
MINIMUM 2048 MB RAM required.
If you can only get 1GB then you will get by but just slowly.
-
Wireless network card – no wired network provided
-
20 GB free Hard disk space
-
USB 2.0 port to copy lab VMs
Operating Systems (one of the following)
-
Windows XP SP2/SP3 or Windows 7 (I don’t trust Vista so you are on your own, but go for it)
-
Administrator access mandatory
-
If it’s a company laptop with user access only, get your administrator to allow USB and install the latest version of VMWare Player
-
Ability to disable Anti-virus / Anti-spyware programs
-
Ability to disable Windows Firewall or personal firewalls
-
An SSH client, such as PuTTY
-
OR
-
Linux kernel 2.4 or 2.6
-
Kernel 2.4 or 2.6 required
-
Root access mandatory
-
Ability to use an X-windows based GUI environment
-
SSH should be available
-