Description: https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-muttik.pdf This session will discuss the risks associated with creation of replicating code. A combination of wide availability of virus source code as well as the problem of control over replicating code make these experiments quite risky. To demonstrate these points we shall see how a computer virus was once created unintentionally in a self-modifying tool called ALREADY.COM (we'll disassemble and debug it). We shall watch a video of the Corrupted blood epidemic in World of Warcraft when a virtual good virus got out of control. We will examine beneficial properties of W32/Nachi worm and discuss pros and cons of harnessing replication for patching vulnerabilities.
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 16 , Defcon 16 , dc-16 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.