2015/07/14 – 2014/12/20
141 Catherine St.
Description:
This whirlwind tour of the field of malware analysis will aim to demonstrate some useful reverse engineering techniques using a case study approach. We’ll walk through the analysis of a real ransomware sample from initial triage and basic analysis to the reverse engineering and code analysis techniques that were used to break the crypto. The results of the analysis will be used to write a standalone decryptor that can be used to unlock files held ransom by the malware campaign. Along the way the audience will learn some of the tricks of the trade such as how to create an analysis environment, using binary disassembly tools, debugging tricks, defeating weak crypto/encoding schemes and anti-reversing techniques.
Presenter Biography
Karim Nathoo is a freelance computer security consultant providing specialized security services to both government and private sector clients. Karim has extensive experience in high assurance ethical hacking, malware analysis, incident response and security product evaluation, including the application of binary code analysis and reverse engineering. Karim has delivered professional services for international clients in Asia, Europe, Canada and the United States. Karim has performed security assurance and engineering engagements for organizations such as Apple, Microsoft, France Telecom, Cloakware Corporation, Creative Labs, Motorola, Verizon, Nokia, Philips Semiconductor, SONY BMG, SUN Microsystems, QNX Software Systems and numerous Canadian and US Government agencies.
Agenda
- 5:30 – 6:15 PM Registration, Networking, Cash Bar and Grill
- 6:15 – 6:20 PM Introduction of Speaker
- 6:20 – 7:20 PM Presentation
- 7:20 – 7:30 PM Question Period
- 7:30 PM Closing remarks
Cost
Members: free, included in your annual dues
Non-Members: $10.00