Offensive Malware Analysis - Dissecting OSX/FruitFly via a Custom C&C Server

Offensive Malware Analysis - Dissecting OSX/FruitFly via a Custom C&C Server

Black Hat via YouTube Direct link

Introduction

1 of 25

1 of 25

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Offensive Malware Analysis - Dissecting OSX/FruitFly via a Custom C&C Server

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Overview
  3. 3 Goal
  4. 4 FruitFly
  5. 5 Variant B
  6. 6 Triaging the Script
  7. 7 Subroutines
  8. 8 Decoding
  9. 9 Main Processing Loop
  10. 10 Basic Protocol
  11. 11 What to Monitor
  12. 12 Network Monitoring
  13. 13 File Monitoring
  14. 14 Process Monitoring
  15. 15 Mouse and Keyboard sniffer
  16. 16 Building our custom C server
  17. 17 What does malware do when it connects
  18. 18 Tasking and handling command responses
  19. 19 Command 2 triage
  20. 20 Communication is key
  21. 21 Fully compatible
  22. 22 Primary C servers
  23. 23 Victim identification
  24. 24 Wrapping up
  25. 25 How can you protect yourself

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.