SlideShare ist ein Scribd-Unternehmen logo
1 von 20
www.SecurityXploded.com
Disclaimer
The Content, Demonstration, Source Code and Programs presented here is "AS IS"
without any warranty or conditions of any kind. Also the views/ideas/knowledge
expressed here are solely of the trainer’s only and nothing to do with the company or
the organization in which the trainer is currently working.

However in no circumstances neither the trainer nor SecurityXploded is responsible for
any damage or loss caused due to use or misuse of the information presented here.




                                     www.SecurityXploded.com
Acknowledgement

 Special thanks to Null & Garage4Hackers community for their extended support and
  cooperation.
 Thanks to all the Trainers who have devoted their precious time and countless hours to
  make it happen.
 Thanks to ThoughtWorks for the beautiful and bigger venue.




                                   www.SecurityXploded.com
Reversing & Malware Analysis Training

This presentation is a part of our Reverse Engineering & Malware Analysis training
program. Currently it is delivered only during our local meet for FREE of cost.




For complete details of this course, visit our Security Training page.




                                     www.SecurityXploded.com
Who we are?
SecurityXploded Research Group
      Group of Security Researchers
      Working for different organizations
      Multi-domain expertise
      Actively working on community projects to make security enjoyable to everyone.




                                 www.SecurityXploded.com
Agenda
   Current projects – Update
     SecurityPhresh

     Training Programme

   The New Thing – Project Trinity
     Security & Beyond!

   New Training Programme Launch



                                www.SecurityXploded.com
SecurityPhresh.com - Security News




              www.SecurityXploded.com
SecurityPhresh.com - Security News
   News from multiple sources on a SINGLE platform

   Popular News and trend analysis

   Launched the beta version last month
     Re-designed the back end engine from scratch

     Simple and beautiful user interactive interface

   More things cooking in the background

   Share your feedback 

                                    www.SecurityXploded.com
SecurityPhresh.com - Security News




  www.SecurityPhresh.com



              www.SecurityXploded.com
Free Training Programme
   Started in Jan 2012, with a hope create more awareness on Reversing
    & Malware Analysis to make security more sensible to everyone.

   Huge success, more than 50K views

   Collaboration with Academic Institutions (Norwich University, USA).

   Trainers invested a good amount of time behind the screen.

     Around 20 internal meetings, presentation reviews, articles, video
      demos, on every session improved the quality.



                                  www.SecurityXploded.com
What is Next ?




    www.SecurityXploded.com
PROJECT TRINITY

                             Security Education
                       [Trainings, Student Mentorship]




                                   Project
                                   TRINITY

  Security Research &
     Development                                            Help Security
[Tools, Articles, Research                             [Local Meets, Platform to
      Community]                                             Young guns]

                             www.SecurityXploded.com
Project Trinity – Security Education

   Student Mentorship Programme – Mentor Selected Students on
    Security Research.
   Just Finished Free Training Series on ‘Reversing & Malware
    Analysis’
   Starting New Advanced Training Series [more about it in the next
    slides]
   Training & Mentorship performed by Expert Security Researchers.




                              www.SecurityXploded.com
Project Trinity – Security Research

   Research Community – Work in a group on emerging
    Security Research projects.

   Started recently with 20+ hand picked security researchers
    globally. Hoping to see greater work and more people join in.

   Free Security Tools – 90+ Tools, 5 Million Downloads
    worldwide.

   Research Articles – on emerging security techniques and
    technologies.
                                  www.SecurityXploded.com
Project Trinity – Help Security

   SecurityXploded Platform – Mainly for Youngsters to Publish
    their Research Work & Gain Greater Recognition

   Mailing list to get answers/help directly from Experts.

   Opportunity to Join us - Are you real good and passionate ?
     Join with us to make a difference. Do the stuff that excites you,

      we will take care of your name. 



                                  www.SecurityXploded.com
Launching New Training Series
“Advanced Malware Analysis”




                www.SecurityXploded.com
“Advanced Malware Analysis”
            Training Sessions
1. Detection and Removal of Malwares

2. Anti-Analysis Techniques (Anti-debugging, Anti-VM etc.)

3. Botnet Analysis - Part 1

4. Botnet Analysis - Part 2

5. Rootkit Analysis

6. Reverse Engineering Automation (Scripts, plugins etc.)



                                www.SecurityXploded.com
“Advanced Malware Analysis”
            Training Sessions
7. Sandboxes (Architecture, Demo, Custom Sanbox etc.)

8. Guest Session (Analysis Automation - Sandbox etc.)

9. Malware Memory Forensics

10. Mobile Reversing (Android/iOS)

11. Guest Session (Mobile Reversing)

12. Mobile Malware Analysis



                               www.SecurityXploded.com
“Advanced Malware Analysis”
                  Training
   Starts from Dec-2012 onwards in our local meets at Bangalore.

   First of its kind and FREE for all.

   Covers advanced aspects and revolves around specific category of
    Malwares

   Delivered by Experts with detailed & practical presentation

   More details will be announced on our Training page soon

    http://securityxploded.com/security-training.php

                                  www.SecurityXploded.com
Thank You !



www.SecurityXploded.com

Weitere ähnliche Inhalte

Was ist angesagt?

Reversing & malware analysis training part 10 exploit development basics
Reversing & malware analysis training part 10   exploit development basicsReversing & malware analysis training part 10   exploit development basics
Reversing & malware analysis training part 10 exploit development basics
Abdulrahman Bassam
 

Was ist angesagt? (20)

Advanced Malware Analysis Training Session 5 - Reversing Automation
Advanced Malware Analysis Training Session 5 - Reversing AutomationAdvanced Malware Analysis Training Session 5 - Reversing Automation
Advanced Malware Analysis Training Session 5 - Reversing Automation
 
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
 
Reversing & malware analysis training part 2 introduction to windows internals
Reversing & malware analysis training part 2   introduction to windows internalsReversing & malware analysis training part 2   introduction to windows internals
Reversing & malware analysis training part 2 introduction to windows internals
 
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
Advanced Malware Analysis Training Session 7  - Malware Memory ForensicsAdvanced Malware Analysis Training Session 7  - Malware Memory Forensics
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Reversing & malware analysis training part 3 windows pe file format basics
Reversing & malware analysis training part 3   windows pe file format basicsReversing & malware analysis training part 3   windows pe file format basics
Reversing & malware analysis training part 3 windows pe file format basics
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password security
 
Anti-Virus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and CountermeasuresAnti-Virus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and Countermeasures
 
Advanced malware analysis training session8 introduction to android
Advanced malware analysis training session8 introduction to androidAdvanced malware analysis training session8 introduction to android
Advanced malware analysis training session8 introduction to android
 
Reversing malware analysis training part1 lab setup guide
Reversing malware analysis training part1 lab setup guideReversing malware analysis training part1 lab setup guide
Reversing malware analysis training part1 lab setup guide
 
Anatomy of Exploit Kits
Anatomy of Exploit KitsAnatomy of Exploit Kits
Anatomy of Exploit Kits
 
Reversing malware analysis training part2 introduction to windows internals
Reversing malware analysis training part2 introduction to windows internalsReversing malware analysis training part2 introduction to windows internals
Reversing malware analysis training part2 introduction to windows internals
 
Advanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensicsAdvanced malware analysis training session 7 malware memory forensics
Advanced malware analysis training session 7 malware memory forensics
 
Reversing malware analysis training part11 exploit development advanced
Reversing malware analysis training part11 exploit development advancedReversing malware analysis training part11 exploit development advanced
Reversing malware analysis training part11 exploit development advanced
 
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
Advanced Malware Analysis Training Session 11 - (Part 2) Dissecting the Heart...
 
Reversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysisReversing malware analysis trainingpart9 advanced malware analysis
Reversing malware analysis trainingpart9 advanced malware analysis
 
Reversing & malware analysis training part 10 exploit development basics
Reversing & malware analysis training part 10   exploit development basicsReversing & malware analysis training part 10   exploit development basics
Reversing & malware analysis training part 10 exploit development basics
 
Reversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basicsReversing malware analysis training part10 exploit development basics
Reversing malware analysis training part10 exploit development basics
 
Reversing malware analysis training part6 practical reversing
Reversing malware analysis training part6 practical reversingReversing malware analysis training part6 practical reversing
Reversing malware analysis training part6 practical reversing
 
Reversing malware analysis training part7 unpackingupx
Reversing malware analysis training part7 unpackingupxReversing malware analysis training part7 unpackingupx
Reversing malware analysis training part7 unpackingupx
 

Ähnlich wie Reversing & Malware Analysis Training Part 13 - Future Roadmap

Reversing & malware analysis training part 1 lab setup guide
Reversing & malware analysis training part 1   lab setup guideReversing & malware analysis training part 1   lab setup guide
Reversing & malware analysis training part 1 lab setup guide
Abdulrahman Bassam
 
Reversing & malware analysis training part 5 reverse engineering tools basics
Reversing & malware analysis training part 5   reverse engineering tools basics Reversing & malware analysis training part 5   reverse engineering tools basics
Reversing & malware analysis training part 5 reverse engineering tools basics
Abdulrahman Bassam
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
abnmi
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
annettsparrow
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
glendar3
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
todd581
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive PRunning head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
MalikPinckney86
 

Ähnlich wie Reversing & Malware Analysis Training Part 13 - Future Roadmap (20)

Reversing & malware analysis training part 1 lab setup guide
Reversing & malware analysis training part 1   lab setup guideReversing & malware analysis training part 1   lab setup guide
Reversing & malware analysis training part 1 lab setup guide
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
Reversing & malware analysis training part 5 reverse engineering tools basics
Reversing & malware analysis training part 5   reverse engineering tools basics Reversing & malware analysis training part 5   reverse engineering tools basics
Reversing & malware analysis training part 5 reverse engineering tools basics
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
 
Turning security into code by Jeff Williams
Turning security into code by Jeff WilliamsTurning security into code by Jeff Williams
Turning security into code by Jeff Williams
 
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfSecurity, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
 
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
Security champions v1.0
Security champions v1.0Security champions v1.0
Security champions v1.0
 
Girl Geek X Indeed Talks (January 18, 2018)
Girl Geek X Indeed Talks (January 18, 2018)Girl Geek X Indeed Talks (January 18, 2018)
Girl Geek X Indeed Talks (January 18, 2018)
 
IT Security - TestArmy
IT Security - TestArmy IT Security - TestArmy
IT Security - TestArmy
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Year Zero
Year ZeroYear Zero
Year Zero
 
"The death of security as we know it: Platform and Security Engineering join ...
"The death of security as we know it: Platform and Security Engineering join ..."The death of security as we know it: Platform and Security Engineering join ...
"The death of security as we know it: Platform and Security Engineering join ...
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docxRunning head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
Running head PRACTICAL CONNECTIONS PAPER 1Executive P.docx
 
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive PRunning head PRACTICAL CONNECTIONS PAPER 1Executive P
Running head PRACTICAL CONNECTIONS PAPER 1Executive P
 

Mehr von securityxploded

Mehr von securityxploded (20)

Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutions
 
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive TacticsHollow Process Injection - Reversing and Investigating Malware Evasive Tactics
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics
 
Buffer Overflow Attacks
Buffer Overflow AttacksBuffer Overflow Attacks
Buffer Overflow Attacks
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learning
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
Linux Malware Analysis using Limon Sandbox
Linux Malware Analysis using Limon SandboxLinux Malware Analysis using Limon Sandbox
Linux Malware Analysis using Limon Sandbox
 
Introduction to SMPC
Introduction to SMPCIntroduction to SMPC
Introduction to SMPC
 
Breaking into hospitals
Breaking into hospitalsBreaking into hospitals
Breaking into hospitals
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Basic malware analysis
Basic malware analysisBasic malware analysis
Basic malware analysis
 
Automating Malware Analysis
Automating Malware AnalysisAutomating Malware Analysis
Automating Malware Analysis
 
Reverse Engineering Malware
Reverse Engineering MalwareReverse Engineering Malware
Reverse Engineering Malware
 
DLL Preloading Attack
DLL Preloading AttackDLL Preloading Attack
DLL Preloading Attack
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
Hunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of MemoryHunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of Memory
 
Return Address – The Silver Bullet
Return Address – The Silver BulletReturn Address – The Silver Bullet
Return Address – The Silver Bullet
 
Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)
 
Hunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory ForensicsHunting Ghost RAT Using Memory Forensics
Hunting Ghost RAT Using Memory Forensics
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learning
 
MalwareNet Project
MalwareNet ProjectMalwareNet Project
MalwareNet Project
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Reversing & Malware Analysis Training Part 13 - Future Roadmap

  • 2. Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions of any kind. Also the views/ideas/knowledge expressed here are solely of the trainer’s only and nothing to do with the company or the organization in which the trainer is currently working. However in no circumstances neither the trainer nor SecurityXploded is responsible for any damage or loss caused due to use or misuse of the information presented here. www.SecurityXploded.com
  • 3. Acknowledgement  Special thanks to Null & Garage4Hackers community for their extended support and cooperation.  Thanks to all the Trainers who have devoted their precious time and countless hours to make it happen.  Thanks to ThoughtWorks for the beautiful and bigger venue. www.SecurityXploded.com
  • 4. Reversing & Malware Analysis Training This presentation is a part of our Reverse Engineering & Malware Analysis training program. Currently it is delivered only during our local meet for FREE of cost. For complete details of this course, visit our Security Training page. www.SecurityXploded.com
  • 5. Who we are? SecurityXploded Research Group  Group of Security Researchers  Working for different organizations  Multi-domain expertise  Actively working on community projects to make security enjoyable to everyone. www.SecurityXploded.com
  • 6. Agenda  Current projects – Update  SecurityPhresh  Training Programme  The New Thing – Project Trinity  Security & Beyond!  New Training Programme Launch www.SecurityXploded.com
  • 7. SecurityPhresh.com - Security News www.SecurityXploded.com
  • 8. SecurityPhresh.com - Security News  News from multiple sources on a SINGLE platform  Popular News and trend analysis  Launched the beta version last month  Re-designed the back end engine from scratch  Simple and beautiful user interactive interface  More things cooking in the background  Share your feedback  www.SecurityXploded.com
  • 9. SecurityPhresh.com - Security News www.SecurityPhresh.com www.SecurityXploded.com
  • 10. Free Training Programme  Started in Jan 2012, with a hope create more awareness on Reversing & Malware Analysis to make security more sensible to everyone.  Huge success, more than 50K views  Collaboration with Academic Institutions (Norwich University, USA).  Trainers invested a good amount of time behind the screen.  Around 20 internal meetings, presentation reviews, articles, video demos, on every session improved the quality. www.SecurityXploded.com
  • 11. What is Next ? www.SecurityXploded.com
  • 12. PROJECT TRINITY Security Education [Trainings, Student Mentorship] Project TRINITY Security Research & Development Help Security [Tools, Articles, Research [Local Meets, Platform to Community] Young guns] www.SecurityXploded.com
  • 13. Project Trinity – Security Education  Student Mentorship Programme – Mentor Selected Students on Security Research.  Just Finished Free Training Series on ‘Reversing & Malware Analysis’  Starting New Advanced Training Series [more about it in the next slides]  Training & Mentorship performed by Expert Security Researchers. www.SecurityXploded.com
  • 14. Project Trinity – Security Research  Research Community – Work in a group on emerging Security Research projects.  Started recently with 20+ hand picked security researchers globally. Hoping to see greater work and more people join in.  Free Security Tools – 90+ Tools, 5 Million Downloads worldwide.  Research Articles – on emerging security techniques and technologies. www.SecurityXploded.com
  • 15. Project Trinity – Help Security  SecurityXploded Platform – Mainly for Youngsters to Publish their Research Work & Gain Greater Recognition  Mailing list to get answers/help directly from Experts.  Opportunity to Join us - Are you real good and passionate ?  Join with us to make a difference. Do the stuff that excites you, we will take care of your name.  www.SecurityXploded.com
  • 16. Launching New Training Series “Advanced Malware Analysis” www.SecurityXploded.com
  • 17. “Advanced Malware Analysis” Training Sessions 1. Detection and Removal of Malwares 2. Anti-Analysis Techniques (Anti-debugging, Anti-VM etc.) 3. Botnet Analysis - Part 1 4. Botnet Analysis - Part 2 5. Rootkit Analysis 6. Reverse Engineering Automation (Scripts, plugins etc.) www.SecurityXploded.com
  • 18. “Advanced Malware Analysis” Training Sessions 7. Sandboxes (Architecture, Demo, Custom Sanbox etc.) 8. Guest Session (Analysis Automation - Sandbox etc.) 9. Malware Memory Forensics 10. Mobile Reversing (Android/iOS) 11. Guest Session (Mobile Reversing) 12. Mobile Malware Analysis www.SecurityXploded.com
  • 19. “Advanced Malware Analysis” Training  Starts from Dec-2012 onwards in our local meets at Bangalore.  First of its kind and FREE for all.  Covers advanced aspects and revolves around specific category of Malwares  Delivered by Experts with detailed & practical presentation  More details will be announced on our Training page soon http://securityxploded.com/security-training.php www.SecurityXploded.com