SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
Clamdigging:	Leveraging	ClamAV
for	Malware	Analysis	and	
Detection
2017-05-12
BSides Denver
Signature	based	detection
• Dead,	right?
• No,	it’s	not	*totally*useless	
• Of	course,	not	enough	on	its	own
• Defense	in	depth
• sigh,	I	know..
• but	srsly
• Hunting!	Tracking!	Punching!
ClamAV
• Its	2017,	why	are	we	talking	about	ClamAV
• Developed	by	Sourcefire,	acquired	by	Cisco	in	2013
• Free,	open	source	(GPL)	anti	virus	solution	for	mail,	endpoint	and	on	
demand	scanning
• Linux	/	BSD
• OSX
• Windows	
• Target	filetypes /	structures
• Decompression	/	unrolling	of	filetypes
• UPX/NSPack,	ZIP/RAR/OLE,	LZMA,	etc
ClamAV 0.99+
• Yay,	good	reasons	to	use	it!
• Updated	functionality
• Decompression	/	unrolling	of	more	filetypes!
• PCRE!
• Yara functionality!
• Yara ->	ClamAV (with	some	exceptions)
• ClamAV decompression	/	unrolling	+	YARA	logic	==	win
• Expanded	sigtool functionality!
So..	why	ClamAV?
• Why	not?	I	just	gave	you	some	good	reasons
• It’s	free
• Some	MTAs	have	Clam	functionality	built	in
• Similar	functionality	to	Yara,	just	does	some	other	stuff	better
• Quick	triage	of	attachments	
• Evil	documents,	macros,	exploits,	etc.
• Detection	capabilities
• Track	threats	across	the	board
• Classify	threats
• Known	evil	doc	vs	known	evil	macro	inside	a	doc	vs	known	Flash	exploit
• Actor	tracking
• APTz,	Builders,	Gangs,	campaigns,	etc
Integration	for	Malware	Analysis
• Automated	analysis	with	Cuckoo	Sandbox
Integration	for	Malware	Analysis
• Pipe	into	your	favorite	tools	for	sorting	results
• Know	when	things	update	and	you	start	missing	detection
• EKs
• Track	the	use	of	known	dropped	exploits	(Flash,	Silverlight,	etc)
• Macros	/	Documents
• Track	Actors	/	Campaigns
• Hunting!
• Write	generic	sigs	to	detect	evil	conditions	and	start	to	hunt
ClamAV for	Malware	Analysis	
• Multiple	lures	/	payloads,	same	macros
ClamAV for	Malware	Analysis	
• Hancitor document	keyword
ClamAV for	Malware	Analysis	
• APT	maldoc detected	by	generic	XOR	exe	sig
ClamAV for	Malware	Analysis	
• Detecting	various	image	lures	embedded	in	docs
ClamAV for	Malware	Analysis	
• Determine	common	doc	social	engineering	lure	text
• Used	~1,000	malicious	docs
• Determined	common	strings	using	statistical	analysis
• Most	common:
• Document	created	in	earlier	version	of	Microsoft	Office	(Word|Excel)
• To	(view|decrypt|display)	this	(content|document),	please	click	"Enable	
Editing"	(form|from)	the	yellow	bar	and	then	click	"Enable	Content”
• To	properly	display	the	document,	please	Enable	Content.
• To	display	the	contents	of	the	document	click	on	Enable	Content	button.
ClamAV for	Malware	Analysis
ClamAV for	Malware	Analysis
• Detecting	JS	droppers/downloaders
ClamAV for	Malware	Analysis
• Malicious	PDF
ClamAV for	Malware	Analysis
• Embedded	objects	in	docs
ClamAV for	Malware	Analysis	
• CVE-2017-0199
ClamAV for	Analysts
• Run	locally,	using	command	line	scanner
• Dissect	raw	macros	within	documents
• How	does	*ClamAV*	see	things?
• What	if	you	don’t	want	to	beautify/deobfuscate the	macros?
• Built	in	tools
• sigtool
• clamscan
• External	tools
• oletools
• viper
• Cuckoo
• lots	more
clamscan
• Command	line	version	of	ClamAV
• $clamscan –d	rules.ldb attachment
• What	I	find	most	useful:
• --debug
• Provides	a	ton	of	useful	information	on	the	target	file
• Also	will	provide	information	when	a	file	is	scanned
• --info
• Provides	a	ton	of	useful	information	on	the	target	file
• --leave-temps
• Saves	temp	files	generated	during	analysis
• UPX	packed	file	->	saves	compressed	file
sigtool
• Swiss-army	knife	for	ClamAV
• What	I	find	most	useful	are:
• --vba
• Dumps	out	the	raw	macros	inside	of	a	document
• --html-normalise
• Creates	an	ascii output	html/js file	which	is	‘normalized’	for	how	ClamAV will	read	it
• Removes	case,	whitespaces,	et
• --decode-sigs
• Feeds	in	sigs	from	stdin and	decodes	the	signatures	contents
• --hex-dump
• Reads	in	from	stdin and	spits	out	hex	dump
sigtool
• $	sigtool --vba ‘evildoc.bin’	|	sigtool --hex-dump	|	less
sigtool
• $	cat	local-rules.ldb |	sigtool --decode
Detour:	Sound	Rule	Writing	Theory
• Know	what	you	want	to	detect:
• Super	specific	content,	ideally	only	one	version	of	something	(think	hash,	or	very	
specific	contents)
• Generic	signature
• Detects	a	specific	type	of	content,	but	with	some	wiggle	room	as	far	as	things	like	variable	
names,	or	domain	names
• Loose	/	Heuristical Signature
• Detects	abnormalities,	or	the	presence	of	something	in	particular
• Sometimes	INFO	level,	but	other	times	Jumping	off	point	to	hunt
• i.e this	APT	uses	this	specific	control	to	auto-run	macros	when	this	document	opens
• Ideally,	the	perfect	rule	will	be	loose	enough	to	allow	slight	changes,	but	
specific	enough	to	capture	the	right	amount	of	maliciousness	indicative	of	
that	specific	threat
ClamAV Signatures
• Have	you	used	YARA?	It’s	pretty	similar
• Various	types	of	ClamAV signatures,	not	limited	to,	but:
• hdb (hash	database)
• Hash	based	signatures– simple
• ldb (logical	database)
• Logical	signatures– getting	trickier	now
• Boolean	logic
• Regex
• Content	modifiers
• Other	stuff	I’m	not	getting	into	because	these	I	find	most	useful
hdb signatures
• 7d8d7e1b9b4e54a113769fae842cc279:48237:EnableMacroLureImg.9.170412
md5	hash file	size message
• sigtool	--md5	<file>
Suggestions	for	sound	signatures
• Naming
• MiscreantPunch.EvilMacro.MultiPSD
L.170425
• Content
• Utilize	conditional	features
• <,	>,	=,	|,	&	for	logical	expressions
• i,	a,	w,	|	for	contents
• *	,	??	(wild	card	bytes)
• !(hex),	negate	bytes
• {x-y}, byte	ranges
• Offsets
• 0:[hex],	etc
• PCREs!
• Anchor	appropriately	to	a	content	
(i,	s,	g,	etc)
• Use	the	appropriate	flags
• ldb logic
• Take	advantage	of
• <,>,=,|,&
• Target	type
• OLE	/	Flash	/	html/js /	etc
Target	Types
src:	github.com/vrtadmin/clamav-devel/blob/master/docs/signatures.pdf
ldb signatures
• MiscreantPunch.EvilMacro.VBDL.170404; Engine:81-255,Target:2; (0&1&2&3&4&(5|6)&7&8&9&10);
4174747269627574652056425f::i;55524c446f776e6c6f6164546f46696c65::i;5c50726f6772616d73::i;5c537
46172747570::i;2e657865::i;2e72756e::i;7368656c6c::i;68747470::i;7/x3a//[^x22x27]+.exeb/si;433a::
i;9/[^x22x27]+.exeb/si
Signature	name Engine	compatibility,	and	Target	type Logical	expression
Desired	contents	used	for	detection	
as	well	as	PCRE
0:	Attribute	VB_ 1:	URLDownloadToFile 2:	Programs
More	examples...
MiscreantPunch.EvilMacro.MultiPSDL.170501;Engine:81-
255,Target:2;(0&1&2&3&4&5&6);4174747269627574652056425f::i;54686973446f63756d656e742e426f6f6b6
d61726b732e436f756e74::i;55426f756e64::i;436872::i;5368656c6c::i;466f726d2e45646974::i;52656d20{3-
20}0d0a466f726d2e45646974??2e{3-20}203d2022220d0a456c73650d0a52656d20{3-
20}0d0a466f726d2e45646974??2e{3-20}203d2022??220d0a::i
MiscreantPunch.RTF.EvilRTF.CVE-2017-0199-Obfus;Engine:81-255,Target:0;(0);0:7b5c7274!(66)*
5c6f626a757064617465
MiscreantPunch.SWF.MultiEKFlashExploit.CommonConStruct.20170505;Engine:81-
255,Target:11;(0&1&2&3&4);d030{0-500}2404c6732a;fcff7f;fcffffff07;0/xd0x30.{0,300}(?P<var1>([xd4-
xd7]|x63.))x2e.(?:[xd0-xd3]|x62.){2}x46.{2}xa0x73x2a(?P=var1)x37(?:[xd4-xd7]|x63.)(?:[xd0-
xd3]|x62.)x2e.xa1x73x2a(?P=var1)x37(?:[xd4-xd7]|x63.)(?:[xd0-
xd3]|x62.)x24x04xc6x73x2a(?P=var1)x37(?:[xd4-xd7]|x63.)(?:[xd0-
xd3]|x62.)/s;0/xa0x73(?P<s1>([xd4-xd7]|x63.))(?:[xd0-xd3]|x62.)(?P<g1>([xd0-
xd3]|x62.))x3c(?P=g1)x2e.xa1x73x2a(?P=s1)x37(?:[xd4-xd7]|x63.)(?P=g1)x24x04xc6x73x2a/s
QAing your	Sigs
• It’s	important	to	test	signatures	before	either	deploying	to	prod	or	an	
analysis	environment
• Twofold:
• Checking	your	sigs	for:
• Misspellings
• Formatting
• Errors
• Test	sigs	against	evil	docs	and	benign	docs– ensure	what	is	supposed	to	
happen..	does
I	wrote	a	sig	and	it	didn’t	fire
• Getting	things	to	fire	on	first	go	isn’t	easy
• Probably	is	your	pcre
• Debug!
• --debug
• $	clamscan –d	<rule-file>.ldb <file>	--debug
• Spits	out	a	ton	of	information	with	regards	to	how	the	engine	inspected	the	
file,	what	it	found,	and	what	conditions	exist
• Useful	for	determining	why	a	sig	didn’t	fire	or	had	problems
clam-punch
• Owned	/	Created	by	the	rule	druid	himself,	Will	Metcalf
• Github repo	containing	buckets	and	shovels
• Several	rulesets	updated	p	much	daily
• MiscreantPunch099-Low.ldb
• miscreantpunch.hdb
• MiscreantPunch099-INFO-Low.ldb
• exexor99.ldb
• Clamdigger
• Signature	generation	tool
clamdigger.py
• Python	script	for	generating	ldb ClamAV signatures
• Does	the	heavy	lifting
• Converts	content	->	hex
• Logically	formats	it
• Appends	macro	auto*	stuff	(if	you	want)
• Add/remove	modifiers
Limitations
• Encrypted	docs
• Observed	in	recent	campaigns
• Use	some	tool	to	bruteforce (or	enter	if	known)	->	send	to	clam	for	processing
• EPS	Files	detected	as	PostScript	are	blanket	ignored
• Multimatch can	be	unreliable
Resources
• ClamAV Signature	Docs	(really	important!)
• github.com/vrtadmin/clamav-devel/blob/master/docs/signatures.pdf
• Miscreant	Punch	Sigs
• github.com/wmetcalf/clam-punch
• Tutorial	on	sigwriting I	made
• www.malwarefor.me/writing-signatures-for-clam-av-0-99-a-tutorial
• SaneSecurity 3rd party	Sigs
• sanesecurity.com/usage/signatures
• ClamAV Mailing	List
• lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
• Mal(?:doc|ware)	Samples
• malware-traffic-analysis.net
• hybrid-analysis.com
• malwr.com
come	hang	w	me	(trainings)
• OISF	Training– Denver,	CO:	June	20-21st
• Mix	of	Suricata User	training	with	a	kicker	of	signature	development
• DerbyCon 7.0 – Lousiville,	KY:	September	20-21st	
• Practical	Signature	Development	for	Open	Source	IDS
• TL;DR	how	to	write	Suricata/Snort	sigs	that	don’t	suck	J
• SuriCon 2017	– Prague,	CZ:	November	15-17th
• https://suricon.net/	
• CFP	open	(talk	to	me!)
• Sponsors	needed!	(support	Open	Source!)
Questions?
• don’t	tweet	me:	@malwareforme
• don’t	email	me:	jack@malwarefor.me
• tks wmetcalf
• tks jwilliams
• tks clamav
• tks Steve	B	/	SaneSecurity
• tks BSides Denver!

Weitere ähnliche Inhalte

Ähnlich wie Clamdigging: Leveraging ClamAV for Malware Analysis and Detection

Safely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAMSafely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAMJonathan Katz
 
Get Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAMGet Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAMJonathan Katz
 
Automatic tool for static analysis
Automatic tool for static analysisAutomatic tool for static analysis
Automatic tool for static analysisChong-Kuan Chen
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Responsepm123008
 
Free and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSEFree and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSEEllie Robinson
 
Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)Oren Eini
 
Search in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the FieldSearch in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the FieldAlex Moundalexis
 
Encryption in php
Encryption in phpEncryption in php
Encryption in phpsana mateen
 
Messaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkMessaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkTomas Doran
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authenticationMohammed Adam
 
Neo4 + Grails
Neo4 + GrailsNeo4 + Grails
Neo4 + Grailsstasimus
 
BinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in HadoopBinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in HadoopJason Trost
 
CNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password AttacksCNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password AttacksSam Bowne
 
Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Mike King
 

Ähnlich wie Clamdigging: Leveraging ClamAV for Malware Analysis and Detection (20)

Hash cat
Hash catHash cat
Hash cat
 
Safely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAMSafely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAM
 
Get Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAMGet Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAM
 
Why ruby and rails
Why ruby and railsWhy ruby and rails
Why ruby and rails
 
Automatic tool for static analysis
Automatic tool for static analysisAutomatic tool for static analysis
Automatic tool for static analysis
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
 
2021_TLSH_SOC_pub.pdf
2021_TLSH_SOC_pub.pdf2021_TLSH_SOC_pub.pdf
2021_TLSH_SOC_pub.pdf
 
rspamd-slides
rspamd-slidesrspamd-slides
rspamd-slides
 
Free and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSEFree and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSE
 
Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)
 
KeyValue Stores
KeyValue StoresKeyValue Stores
KeyValue Stores
 
Search in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the FieldSearch in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the Field
 
Encryption in php
Encryption in phpEncryption in php
Encryption in php
 
Neo4J and Grails
Neo4J and GrailsNeo4J and Grails
Neo4J and Grails
 
Messaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkMessaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new framework
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authentication
 
Neo4 + Grails
Neo4 + GrailsNeo4 + Grails
Neo4 + Grails
 
BinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in HadoopBinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in Hadoop
 
CNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password AttacksCNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password Attacks
 
Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Clamdigging: Leveraging ClamAV for Malware Analysis and Detection