SlideShare a Scribd company logo
www.SecurityXploded.com
Disclaimer
The Content, Demonstration, Source Code and Programs presented here is "AS IS"
without any warranty or conditions of any kind. Also the views/ideas/knowledge
expressed here are solely of the trainer’s only and nothing to do with the company or
the organization in which the trainer is currently working.

However in no circumstances neither the trainer nor SecurityXploded is responsible for
any damage or loss caused due to use or misuse of the information presented here.




                                     www.SecurityXploded.com
Acknowledgement

 Special thanks to Null & Garage4Hackers community for their extended support and
  cooperation.
 Thanks to all the Trainers who have devoted their precious time and countless hours to
  make it happen.
 Thanks to ThoughtWorks for the beautiful and bigger venue.




                                   www.SecurityXploded.com
Reversing & Malware Analysis Training

This presentation is a part of our Reverse Engineering & Malware Analysis training
program. Currently it is delivered only during our local meet for FREE of cost.




For complete details of this course, visit our Security Training page.




                                     www.SecurityXploded.com
Who we are?
SecurityXploded Research Group
      Group of Security Researchers
      Working for different organizations
      Multi-domain expertise
      Actively working on community projects to make security enjoyable to everyone.




                                 www.SecurityXploded.com
Agenda
   Current projects – Update
     SecurityPhresh

     Training Programme

   The New Thing – Project Trinity
     Security & Beyond!

   New Training Programme Launch



                                www.SecurityXploded.com
SecurityPhresh.com - Security News




              www.SecurityXploded.com
SecurityPhresh.com - Security News
   News from multiple sources on a SINGLE platform

   Popular News and trend analysis

   Launched the beta version last month
     Re-designed the back end engine from scratch

     Simple and beautiful user interactive interface

   More things cooking in the background

   Share your feedback 

                                    www.SecurityXploded.com
SecurityPhresh.com - Security News




  www.SecurityPhresh.com



              www.SecurityXploded.com
Free Training Programme
   Started in Jan 2012, with a hope create more awareness on Reversing
    & Malware Analysis to make security more sensible to everyone.

   Huge success, more than 50K views

   Collaboration with Academic Institutions (Norwich University, USA).

   Trainers invested a good amount of time behind the screen.

     Around 20 internal meetings, presentation reviews, articles, video
      demos, on every session improved the quality.



                                  www.SecurityXploded.com
What is Next ?




    www.SecurityXploded.com
PROJECT TRINITY

                             Security Education
                       [Trainings, Student Mentorship]




                                   Project
                                   TRINITY

  Security Research &
     Development                                            Help Security
[Tools, Articles, Research                             [Local Meets, Platform to
      Community]                                             Young guns]

                             www.SecurityXploded.com
Project Trinity – Security Education

   Student Mentorship Programme – Mentor Selected Students on
    Security Research.
   Just Finished Free Training Series on ‘Reversing & Malware
    Analysis’
   Starting New Advanced Training Series [more about it in the next
    slides]
   Training & Mentorship performed by Expert Security Researchers.




                              www.SecurityXploded.com
Project Trinity – Security Research

   Research Community – Work in a group on emerging
    Security Research projects.

   Started recently with 20+ hand picked security researchers
    globally. Hoping to see greater work and more people join in.

   Free Security Tools – 90+ Tools, 5 Million Downloads
    worldwide.

   Research Articles – on emerging security techniques and
    technologies.
                                  www.SecurityXploded.com
Project Trinity – Help Security

   SecurityXploded Platform – Mainly for Youngsters to Publish
    their Research Work & Gain Greater Recognition

   Mailing list to get answers/help directly from Experts.

   Opportunity to Join us - Are you real good and passionate ?
     Join with us to make a difference. Do the stuff that excites you,

      we will take care of your name. 



                                  www.SecurityXploded.com
Launching New Training Series
“Advanced Malware Analysis”




                www.SecurityXploded.com
“Advanced Malware Analysis”
            Training Sessions
1. Detection and Removal of Malwares

2. Anti-Analysis Techniques (Anti-debugging, Anti-VM etc.)

3. Botnet Analysis - Part 1

4. Botnet Analysis - Part 2

5. Rootkit Analysis

6. Reverse Engineering Automation (Scripts, plugins etc.)



                                www.SecurityXploded.com
“Advanced Malware Analysis”
            Training Sessions
7. Sandboxes (Architecture, Demo, Custom Sanbox etc.)

8. Guest Session (Analysis Automation - Sandbox etc.)

9. Malware Memory Forensics

10. Mobile Reversing (Android/iOS)

11. Guest Session (Mobile Reversing)

12. Mobile Malware Analysis



                               www.SecurityXploded.com
“Advanced Malware Analysis”
                  Training
   Starts from Dec-2012 onwards in our local meets at Bangalore.

   First of its kind and FREE for all.

   Covers advanced aspects and revolves around specific category of
    Malwares

   Delivered by Experts with detailed & practical presentation

   More details will be announced on our Training page soon

    http://securityxploded.com/security-training.php

                                  www.SecurityXploded.com
Thank You !



www.SecurityXploded.com

More Related Content

PPTX
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
PPTX
Advanced Malware Analysis Training Session 8 - Introduction to Android
PPTX
Advanced Malware Analysis Training Session 6 - Malware Sandbox Analysis
PPTX
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
PPTX
Reversing & malware analysis training part 1 lab setup guide
PPTX
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
PPTX
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
PPTX
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
Advanced Malware Analysis Training Session 8 - Introduction to Android
Advanced Malware Analysis Training Session 6 - Malware Sandbox Analysis
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Reversing & malware analysis training part 1 lab setup guide
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Advanced Malware Analysis Training Session 1 - Detection and Removal of Malwares
Advanced Malware Analysis Training Session 3 - Botnet Analysis Part 2

What's hot (20)

PPTX
Advanced Malware Analysis Training Session 5 - Reversing Automation
PPTX
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
PPTX
Reversing & malware analysis training part 2 introduction to windows internals
PPTX
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
PPTX
Application Virtualization
PPTX
Reversing & malware analysis training part 3 windows pe file format basics
PPTX
Primer on password security
PPTX
Anti-Virus Evasion Techniques and Countermeasures
PPTX
Advanced malware analysis training session8 introduction to android
PPTX
Reversing malware analysis training part1 lab setup guide
PPTX
Anatomy of Exploit Kits
PPTX
Reversing malware analysis training part2 introduction to windows internals
PPTX
Advanced malware analysis training session 7 malware memory forensics
PPTX
Reversing malware analysis training part11 exploit development advanced
PPTX
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
PPTX
Reversing malware analysis trainingpart9 advanced malware analysis
PDF
Reversing & malware analysis training part 10 exploit development basics
PPTX
Reversing malware analysis training part10 exploit development basics
PPTX
Reversing malware analysis training part6 practical reversing
PPTX
Reversing malware analysis training part7 unpackingupx
Advanced Malware Analysis Training Session 5 - Reversing Automation
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Reversing & malware analysis training part 2 introduction to windows internals
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
Application Virtualization
Reversing & malware analysis training part 3 windows pe file format basics
Primer on password security
Anti-Virus Evasion Techniques and Countermeasures
Advanced malware analysis training session8 introduction to android
Reversing malware analysis training part1 lab setup guide
Anatomy of Exploit Kits
Reversing malware analysis training part2 introduction to windows internals
Advanced malware analysis training session 7 malware memory forensics
Reversing malware analysis training part11 exploit development advanced
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Reversing malware analysis trainingpart9 advanced malware analysis
Reversing & malware analysis training part 10 exploit development basics
Reversing malware analysis training part10 exploit development basics
Reversing malware analysis training part6 practical reversing
Reversing malware analysis training part7 unpackingupx
Ad

Similar to Reversing & Malware Analysis Training Part 13 - Future Roadmap (20)

PDF
Reversing & malware analysis training part 1 lab setup guide
PDF
Advanced Malware Analysis Training - Detection and Removal of Malwares
PPT
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PPT
Web Application Testing for Today’s Biggest and Emerging Threats
PPTX
IBM Smarter Business 2012 - IBM Security: Threat landscape
PDF
NetVU Tech-4290/4390
PPT
Presentación AMIB Los Cabos
PDF
2 21677 splunk_big_data_futureofsecurity
PDF
IBM X-Force 2010 Trend and Risk Report-March 2011
PPT
Current Emerging Threats
PPT
The unprecedented state of web insecurity
PDF
PPTX
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
PDF
MCR X Force 2011 Trend And Risk Report
PDF
Threat Report H2 2012
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PDF
Malware Analysis Report
PDF
Reversing & malware analysis training part 12 rootkit analysis
PDF
Scaling Web 2.0 Malware Infection
PDF
TRISC 2010 - Grapevine , Texas
Reversing & malware analysis training part 1 lab setup guide
Advanced Malware Analysis Training - Detection and Removal of Malwares
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
Web Application Testing for Today’s Biggest and Emerging Threats
IBM Smarter Business 2012 - IBM Security: Threat landscape
NetVU Tech-4290/4390
Presentación AMIB Los Cabos
2 21677 splunk_big_data_futureofsecurity
IBM X-Force 2010 Trend and Risk Report-March 2011
Current Emerging Threats
The unprecedented state of web insecurity
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
MCR X Force 2011 Trend And Risk Report
Threat Report H2 2012
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Malware Analysis Report
Reversing & malware analysis training part 12 rootkit analysis
Scaling Web 2.0 Malware Infection
TRISC 2010 - Grapevine , Texas
Ad

More from securityxploded (20)

PPTX
Fingerprinting healthcare institutions
PDF
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
PDF
Buffer Overflow Attacks
PPTX
Malicious Client Detection Using Machine Learning
PDF
Understanding CryptoLocker (Ransomware) with a Case Study
PDF
Linux Malware Analysis using Limon Sandbox
PPT
Introduction to SMPC
PPTX
Breaking into hospitals
PPTX
Bluetooth [in]security
PPTX
Basic malware analysis
PPTX
Automating Malware Analysis
PPTX
Reverse Engineering Malware
PPTX
DLL Preloading Attack
PPTX
Partial Homomorphic Encryption
PPTX
Hunting Rootkit From the Dark Corners Of Memory
PPTX
Return Address – The Silver Bullet
PPTX
Defeating public exploit protections (EMET v5.2 and more)
PPTX
Hunting Ghost RAT Using Memory Forensics
PPTX
Malicious Url Detection Using Machine Learning
PPTX
MalwareNet Project
Fingerprinting healthcare institutions
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Buffer Overflow Attacks
Malicious Client Detection Using Machine Learning
Understanding CryptoLocker (Ransomware) with a Case Study
Linux Malware Analysis using Limon Sandbox
Introduction to SMPC
Breaking into hospitals
Bluetooth [in]security
Basic malware analysis
Automating Malware Analysis
Reverse Engineering Malware
DLL Preloading Attack
Partial Homomorphic Encryption
Hunting Rootkit From the Dark Corners Of Memory
Return Address – The Silver Bullet
Defeating public exploit protections (EMET v5.2 and more)
Hunting Ghost RAT Using Memory Forensics
Malicious Url Detection Using Machine Learning
MalwareNet Project

Recently uploaded (20)

PPTX
Chapter 5: Probability Theory and Statistics
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Hybrid model detection and classification of lung cancer
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Chapter 5: Probability Theory and Statistics
A novel scalable deep ensemble learning framework for big data classification...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
TLE Review Electricity (Electricity).pptx
cloud_computing_Infrastucture_as_cloud_p
1 - Historical Antecedents, Social Consideration.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Mushroom cultivation and it's methods.pdf
Web App vs Mobile App What Should You Build First.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Enhancing emotion recognition model for a student engagement use case through...
Hindi spoken digit analysis for native and non-native speakers
NewMind AI Weekly Chronicles - August'25-Week II
Hybrid model detection and classification of lung cancer
A comparative analysis of optical character recognition models for extracting...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Reversing & Malware Analysis Training Part 13 - Future Roadmap

  • 2. Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are solely of the trainer’s only and nothing to do with the company or the organization in which the trainer is currently working. However in no circumstances neither the trainer nor SecurityXploded is responsible for any damage or loss caused due to use or misuse of the information presented here. www.SecurityXploded.com
  • 3. Acknowledgement  Special thanks to Null & Garage4Hackers community for their extended support and cooperation.  Thanks to all the Trainers who have devoted their precious time and countless hours to make it happen.  Thanks to ThoughtWorks for the beautiful and bigger venue. www.SecurityXploded.com
  • 4. Reversing & Malware Analysis Training This presentation is a part of our Reverse Engineering & Malware Analysis training program. Currently it is delivered only during our local meet for FREE of cost. For complete details of this course, visit our Security Training page. www.SecurityXploded.com
  • 5. Who we are? SecurityXploded Research Group  Group of Security Researchers  Working for different organizations  Multi-domain expertise  Actively working on community projects to make security enjoyable to everyone. www.SecurityXploded.com
  • 6. Agenda  Current projects – Update  SecurityPhresh  Training Programme  The New Thing – Project Trinity  Security & Beyond!  New Training Programme Launch www.SecurityXploded.com
  • 7. SecurityPhresh.com - Security News www.SecurityXploded.com
  • 8. SecurityPhresh.com - Security News  News from multiple sources on a SINGLE platform  Popular News and trend analysis  Launched the beta version last month  Re-designed the back end engine from scratch  Simple and beautiful user interactive interface  More things cooking in the background  Share your feedback  www.SecurityXploded.com
  • 9. SecurityPhresh.com - Security News www.SecurityPhresh.com www.SecurityXploded.com
  • 10. Free Training Programme  Started in Jan 2012, with a hope create more awareness on Reversing & Malware Analysis to make security more sensible to everyone.  Huge success, more than 50K views  Collaboration with Academic Institutions (Norwich University, USA).  Trainers invested a good amount of time behind the screen.  Around 20 internal meetings, presentation reviews, articles, video demos, on every session improved the quality. www.SecurityXploded.com
  • 11. What is Next ? www.SecurityXploded.com
  • 12. PROJECT TRINITY Security Education [Trainings, Student Mentorship] Project TRINITY Security Research & Development Help Security [Tools, Articles, Research [Local Meets, Platform to Community] Young guns] www.SecurityXploded.com
  • 13. Project Trinity – Security Education  Student Mentorship Programme – Mentor Selected Students on Security Research.  Just Finished Free Training Series on ‘Reversing & Malware Analysis’  Starting New Advanced Training Series [more about it in the next slides]  Training & Mentorship performed by Expert Security Researchers. www.SecurityXploded.com
  • 14. Project Trinity – Security Research  Research Community – Work in a group on emerging Security Research projects.  Started recently with 20+ hand picked security researchers globally. Hoping to see greater work and more people join in.  Free Security Tools – 90+ Tools, 5 Million Downloads worldwide.  Research Articles – on emerging security techniques and technologies. www.SecurityXploded.com
  • 15. Project Trinity – Help Security  SecurityXploded Platform – Mainly for Youngsters to Publish their Research Work & Gain Greater Recognition  Mailing list to get answers/help directly from Experts.  Opportunity to Join us - Are you real good and passionate ?  Join with us to make a difference. Do the stuff that excites you, we will take care of your name.  www.SecurityXploded.com
  • 16. Launching New Training Series “Advanced Malware Analysis” www.SecurityXploded.com
  • 17. “Advanced Malware Analysis” Training Sessions 1. Detection and Removal of Malwares 2. Anti-Analysis Techniques (Anti-debugging, Anti-VM etc.) 3. Botnet Analysis - Part 1 4. Botnet Analysis - Part 2 5. Rootkit Analysis 6. Reverse Engineering Automation (Scripts, plugins etc.) www.SecurityXploded.com
  • 18. “Advanced Malware Analysis” Training Sessions 7. Sandboxes (Architecture, Demo, Custom Sanbox etc.) 8. Guest Session (Analysis Automation - Sandbox etc.) 9. Malware Memory Forensics 10. Mobile Reversing (Android/iOS) 11. Guest Session (Mobile Reversing) 12. Mobile Malware Analysis www.SecurityXploded.com
  • 19. “Advanced Malware Analysis” Training  Starts from Dec-2012 onwards in our local meets at Bangalore.  First of its kind and FREE for all.  Covers advanced aspects and revolves around specific category of Malwares  Delivered by Experts with detailed & practical presentation  More details will be announced on our Training page soon http://securityxploded.com/security-training.php www.SecurityXploded.com