SlideShare a Scribd company logo
LOGO
Security Research and
Development
Framework
By Amr Thabet
Malware Researcher
@Q-CERT
About The Author
Malware Researcher at Q-CERT
Wrote a Stuxnet Malware Analysis
Paper
Author of Pokas x86 Emulator
Author of SRDF (what we will talk
about)
Introduction
Development Framework (Library)
Contains many security classes/tools
Created For:
 Malware Analysis
 Packet Analysis
 Antivirus and Firewall Tools
Free and Open Source
Why SRDF?
For This Guy !!
Why SRDF?
Implement your Inovative Idea
Don’t re-invent The Wheel
Don’t waste your time
Flexible Design
Production Quality
Community Based Development and
Beta-testing
Contents
Design
• User-Mode
• Kernel-Mode
• Features
Major Projects
• Packetyzer
• x86 Emulator
Projects Based on SRDF
• Inspector’s Gadget
• Exploitation Detection System (EDS)
User-Mode Design
User-Mode Design
Infrastructure:
The Common Part at any Framework … not related to
security
Targets:
What you will secure or secure from
Libraries:
The Security Tools are here  … it’s divided into Malware
and Network
Core:
The interface and the managment
Features
Full OOP
PE, ELF, PDF and Andorid File Parsers
x86 Disassembler, Debugger and Emulator
API Hooking
Packet, Protocol and Network Flow Analysis
Production Quality
FREE and Open Source
Kernel-Mode
Support x32 Bits until now
Little bit old
Should be extended to x64
Under Construction
Kernel- Mode Design
Major Projects
• Packetyzer
• x86 Emulator
Packetyzer
Created By Anwar Mohamed
Packet Analysis Tool
Session Separation
Generating Packets and Send (Winpcap)
Decodes:
 ARP,ICMP,TCP,UDP
 HTTP, DNS
Parse PCAP Files
Reassemble Packets
Design
Simple Demo – Read Pcap File
Simple Demo – DNS Streams
Simple Demo – HTTP Streams
Simple Demo – HTTP Output
Packetyzer
Reach it at:
https://github.com/AnwarMohamed/Packetyzer
It’s also a Part of SRDF
Pokas Emulator
For win32 Applications
very powerful debugger
Monitor Memory Writes
Emulate PE Files and Shellcode
Dump The Process
Reconstruct Import Table
SRDF has a Wrapper Class for it
Design
The Emulator’s Debugger
Take String Condition
Convert it into Native Code
Very Fast
Easy to Customize
Have Predefined Functions
Allow to Add Function
Examples
“__isdirty(eip)“
"__disp() >=0x00401000 &&ecx>10“
"(eax& 0xff)> 5*(edx& 0xff) ||
__read(0x401000)==0x500“
"__isapiequal('getprocaddress') ||
__isapiequal('loadlibraryA')“
Demo: Unpack UPX - PEid
Demo: Unpack UPX – ImportTable
Demo: Unpack UPX - Code
Demo: Unpack UPX – Run Code
Demo: Unpack UPX - Unpacked
Demo: Unpack UPX - ImportTable
x86 Emulator
Reach it at:
https://github.com/AmrThabet/x86Emulator
Projects Based on SRDF
• Inspector’s Gadget
• Exploitation Detection System
Inspector’s Gadget
Created by Jonas lykkegaard
ROP gadget indexing and searching tool.
Emulating Gadgets
Scoring and Categorizing
Flexible Search
Design
Features
Categorizing by Behavior
Scoring Gadgets
Allow ret, pop/jmp, iret and ret far
Depends on SQLite
SQL Searching
Predefined SQL Queries
GUI Based
GUI
VB2013 - Security Research and Development Framework
Exploitation Detection System
Security Mitigation Tool
Detect memory corruption exploits
Based on SRDF
Talked about it in
Reach it at:Defcon 21 archive
Normal API call check
API call with Ret
Reach Us
SRDF Links:
 https://github.com/AmrThabet/winSRDF
 FB: http://www.facebook.com/SecDevelop
 Twitter: https://twitter.com/winSRDF
 Website: http://security-framework.com/
Conclusion
Development Framework for security
Contains many tools in Malware and
Network
Flexible expandable Design
Kernel-Mode and User-Mode
Free and Open Source
Join Us
Any Question?
LOGO

More Related Content

PDF
Introduction to ida python
PDF
Snake bites : Python for Pentesters
PDF
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
PPTX
Get-Help: An intro to PowerShell and how to Use it for Evil
PPTX
Injection on Steroids: Codeless code injection and 0-day techniques
PPTX
Incorporating PowerShell into your Arsenal with PS>Attack
PDF
CNIT 126 12: Covert Malware Launching
PPTX
How Safe is your Link ?
Introduction to ida python
Snake bites : Python for Pentesters
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Get-Help: An intro to PowerShell and how to Use it for Evil
Injection on Steroids: Codeless code injection and 0-day techniques
Incorporating PowerShell into your Arsenal with PS>Attack
CNIT 126 12: Covert Malware Launching
How Safe is your Link ?

What's hot (20)

PPTX
Introducing PS>Attack: An offensive PowerShell toolkit
PDF
5 Ways to Secure Your Containers for Docker and Beyond
PPTX
DevSecCon Tel Aviv 2018 - Integrated Security Testing by Morgan Roman
PDF
Practical Malware Analysis Ch12
PDF
[2014 CodeEngn Conference 10] 정광운 - 안드로이드에서도 한번 후킹을 해볼까 (Hooking on Android)
PDF
BlueHat v18 || Linear time shellcode detection using state machines and opera...
PPTX
Anatomy of a Buffer Overflow Attack
PPTX
BuildStuff.LT 2018 InSpec Workshop
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
PDF
Common technique in Bypassing Stuff in Python.
PDF
Bypassing patchguard on Windows 8.1 and Windows 10
PPTX
Sticky Keys to the Kingdom
PDF
Oscp preparation
ODP
Os Cook
PPTX
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
PDF
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
PPTX
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
PPTX
Containers and Security for DevOps
PPTX
Windows privilege escalation by Dhruv Shah
PDF
Practical Malware Analysis: Ch 8: Debugging
Introducing PS>Attack: An offensive PowerShell toolkit
5 Ways to Secure Your Containers for Docker and Beyond
DevSecCon Tel Aviv 2018 - Integrated Security Testing by Morgan Roman
Practical Malware Analysis Ch12
[2014 CodeEngn Conference 10] 정광운 - 안드로이드에서도 한번 후킹을 해볼까 (Hooking on Android)
BlueHat v18 || Linear time shellcode detection using state machines and opera...
Anatomy of a Buffer Overflow Attack
BuildStuff.LT 2018 InSpec Workshop
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Common technique in Bypassing Stuff in Python.
Bypassing patchguard on Windows 8.1 and Windows 10
Sticky Keys to the Kingdom
Oscp preparation
Os Cook
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 2 Malware Analysis in Virtual Machines & 3: Ba...
Containers and Security for DevOps
Windows privilege escalation by Dhruv Shah
Practical Malware Analysis: Ch 8: Debugging
Ad

Viewers also liked (20)

PDF
ปก
DOCX
ปกรายงาน
PDF
หน้าปกโครงงาน
DOCX
PDF
ตัวอย่าง ปกรายงาน
PDF
หน้าปก
PDF
รูปแบบการเขียนรายงานโครงงาน 5 บท
DOC
หน้าปกรายงาน
DOC
PDF
สรุปงานคอมปี2553
DOCX
โครงงาน
PDF
สมุดเล่มเล็ก
PDF
9789740333388
DOCX
หน้าปกโครงงานคอมพิวเตอร์
DOCX
โครงงาน
PDF
รายงานผลการดำเนินงานโครงงานคอมพิวเตอร์ ต่ำเสื่อทอสาด
PDF
คู่มือการเขียนรายงานวิจัยฉบับสมบูรณ์
PDF
โครงการจิตอาสาพัฒนาวัด
ปก
ปกรายงาน
หน้าปกโครงงาน
ตัวอย่าง ปกรายงาน
หน้าปก
รูปแบบการเขียนรายงานโครงงาน 5 บท
หน้าปกรายงาน
สรุปงานคอมปี2553
โครงงาน
สมุดเล่มเล็ก
9789740333388
หน้าปกโครงงานคอมพิวเตอร์
โครงงาน
รายงานผลการดำเนินงานโครงงานคอมพิวเตอร์ ต่ำเสื่อทอสาด
คู่มือการเขียนรายงานวิจัยฉบับสมบูรณ์
โครงการจิตอาสาพัฒนาวัด
Ad

Similar to VB2013 - Security Research and Development Framework (20)

PPTX
A New Framework for Detection
PDF
Sourcefire Vulnerability Research Team Labs
PPTX
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
PDF
Dive into exploit development
PDF
Pitfalls and limits of dynamic malware analysis
PDF
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
PDF
Malware Analysis -an overview by PP Singh
PDF
'Malware Analysis' by PP Singh
PPTX
Network Traffic Analysis With Wireshark.pptx
PPTX
Dpdk applications
PDF
My old security advisories on HMI/SCADA and industrial software released betw...
PDF
EMBA - From Firmware to Exploit - BHEU22
PDF
EMBA Firmware analysis - TROOPERS22
PDF
H@dfex 2015 malware analysis
PDF
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
PDF
EMBA - Firmware analysis - Black Hat Arsenal USA 2022
PDF
EMBA - Firmware analysis DEFCON30 demolabs USA 2022
PPTX
Vulnerability, exploit to metasploit
PPTX
Reverse Engineering Malware - A Practical Guide
PPTX
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques
A New Framework for Detection
Sourcefire Vulnerability Research Team Labs
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
Dive into exploit development
Pitfalls and limits of dynamic malware analysis
"Automated Malware Analysis" de Gabriel Negreira Barbosa, Malware Research an...
Malware Analysis -an overview by PP Singh
'Malware Analysis' by PP Singh
Network Traffic Analysis With Wireshark.pptx
Dpdk applications
My old security advisories on HMI/SCADA and industrial software released betw...
EMBA - From Firmware to Exploit - BHEU22
EMBA Firmware analysis - TROOPERS22
H@dfex 2015 malware analysis
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
EMBA - Firmware analysis - Black Hat Arsenal USA 2022
EMBA - Firmware analysis DEFCON30 demolabs USA 2022
Vulnerability, exploit to metasploit
Reverse Engineering Malware - A Practical Guide
Advanced Malware Analysis Training Session 4 - Anti-Analysis Techniques

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
sap open course for s4hana steps from ECC to s4
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MIND Revenue Release Quarter 2 2025 Press Release
Spectral efficient network and resource selection model in 5G networks
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx

VB2013 - Security Research and Development Framework