Description: "From malformed PDF to exploit to dropper to infection... What if you could map out every step that malware takes? Using real-time, kernel-layer visibility tools, we will review all the fun things that happen post-exploit. While exploits change from 0-day to 0-day, the patterns of infection show us that there are other ways to protect against advanced threats, nuisance malware, and adware.
***Experienced crash during recording but was able to salvage portions from this great presentation. Apologies for gaps and other issues!***
For More Information Please Visit: - http://www.securitybsides.com/w/page/92311122/BSidesATL2015
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.