Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть Malware Hunting - Using python as attack weapon | Filipi Pires | Conf42 Python 2022

  • Conf42
  • 2022-03-01
  • 231
Malware Hunting - Using python as attack weapon | Filipi Pires | Conf42 Python 2022
regressprogressflaskapigoogle colabazure health botkubernetesopenshiftreproducible experimentsml modelsdatadata sciencesecurityapplicationssecurity catalystcode packagesmalware huntingpackagingdecoratorsfinancial networkgeospatial analysisensembling techniquestime series forecastingside carsebpfTDDreal-time analytics dashboardstreamlitapachepinotkafkapolyglot cloud-native debuggerapmself-contained developmentimposter syndrome
  • ok logo

Скачать Malware Hunting - Using python as attack weapon | Filipi Pires | Conf42 Python 2022 бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно Malware Hunting - Using python as attack weapon | Filipi Pires | Conf42 Python 2022 или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку Malware Hunting - Using python as attack weapon | Filipi Pires | Conf42 Python 2022 бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео Malware Hunting - Using python as attack weapon | Filipi Pires | Conf42 Python 2022

Filipi Pires
Cyber Security Evangelist at senhasegura

The purpose of this presentation is to use python scripts to perform some tests of efficiency and detection in various endpoint solutions, during our demonstration we`ll show a defensive security analysis with an offensive mind performing an execution some python scripts responsible for downloading some malware in Lab environment. The first objective will be to simulate targeted attacks using a python script to obtain a panoramic view of the resilience presented by the solution, with regard to the efficiency in its detection by signatures, NGAV and Machine Learning, running this script, the idea is to download these artifacts directly on the victim's machine. The second objective is to run more than one python script with daily malware, made available by MalwaresBazaar upon request via API access, downloanding daily batches of malwares.

With the final product, the front responsible for the product will have an instrument capable of guiding a mitigation and / or correction process, as well as optimized improvement, based on the criticality of the risks.

Article`s reference:
https://pentestmag.com/product/pentes... ( 2x Articles published | Exploitation with Shell Reverse and Infection with PowerShell using VBS File | Zusy Malware using MSI)
https://pentestmag.com/product/pentes... ( 2x Articles published | Testing Creative Way Detection and Efficiency in Sophos Security Sensors | Outbreak Infection from Malware Bazaar, undetected by Sophos
https://hakin9.org/product/malware-at... (Hunting the Hunters-Detection and Efficiency Testing of Endpoint Security Sensors)
https://pentestmag.com/product/pentes... ( 2x Articles Published | Threat Hunting Labs Engines Problems in Cybereason AV | Infection with Ransomware Using Delay in Applying Policies)
https://hakin9.org/product/cyber-thre... (Infection with Malware By Script Python NOT Detected by AV)
https://eforensicsmag.com/product/thr... (Infection by Outbreak Attack Malicious)

Similar presentations:
   • Discovering C&C in Malicious PDFs with obf...   (NahamCon's on RTV 2021 - Discovering C&C in Malicious PDFs)
   • Dissecting and Comparing Different Binarie...   (GrayHat - Red Team Village - 2020- US) - Malware Analysis
   • Pivoting and Exploitation in Docker Enviro...   (GrayHat - Red Team Village - 2020 - US) - Pivoting Technique
   • Dissecting and Comparing different Binarie...   (BSIDES DFW - 2020 - US) - Malware Analysis
   • #Hacktivity2020 Live Stream // DAY 3 - 10t...   (Hacktivity - Budapest 2020) - Dissecting Malware
   • Видео   (D.C. Cybersecurity Professionals - 2020 - US) - Cyber Threat Hunting: Identify and Hunt Down Intruders
   • Видео   (D.C. Cybersecurity Professionals - 2020 - US) - Dissecting PDF Files to Malware Analysis
   • #HITBCyberWeek #CommSec D1 - Detection and...   (HITB -2020 - Hack In The Box Security Conference - Europe) - Threat Hunting

Other talks at this conference 🚀🪐 https://www.conf42.com​/python2022

—

0:00 Intro
0:24 Talk

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]