Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Crypto Gone Rogue - A Tale of Ransomware, Key Management, and the CryptoAPI

via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the evolution of ransomware key management and its interaction with the Windows CryptoAPI in this 26-minute conference talk from GrrCon 2018. Delve into the necessary elements of ransomware, the importance of key management, and its progression over time. Examine the relationship between Windows, ransomware, and the native CryptoAPI, using NotPetya as a case study. Learn about crucial CryptoAPI calls, including CryptAcquireContext, CryptEncrypt, CryptImportKey, CryptDestroy, and CryptReleaseContext. Gain insights into ransomware design and draw valuable conclusions about the intersection of cryptography and malicious software.

Syllabus

Intro
Necessary Elements of a Ransomware
Why Key Management?
Evolution of Key Management
The Windows
Ransomware and the
Why Use the Native
NotPetya Ransom Message
List of Imports
CryptoAPI Calls
CryptAcquire Context
CryptEncrypt
CryptimportKey
CryptDestroy
CryptRelease Context
Ransomware Design
Conclusion

Reviews

Start your review of Crypto Gone Rogue - A Tale of Ransomware, Key Management, and the CryptoAPI

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.