OK.
Now we arrive at the malware-focused link-bin. This one seems a bit all over the road despite my best efforts at categorizing them a bit.
- Improving Your Malware Forensics Skills - Journey Into Incident Response - Corey Harrell
 - Intrusion Analysis Using Windows PowerShell - (PDF link) - SANS Institute Reading Room whitepaper by Michael J. Weeks.
 - Creating a Baseline of Process Activity for Memory Forensics - (PDF link) - SANS Institute Reading Room whitepaper by Gordon Fraser.
 - Malware Root Cause Analysis Dont Be a Bone Head Slide Deck - Journey Into Incident Response - Corey Harrell - Follow-on presentation to Corey’s Finding Malware Like Iron Man presentation.
 - Malware Analysis with pedump - InfoSec Handlers Diary Blog
 - Automating Malware Analysis with Cuckoo Sandbox - Malwarebytes Unpacked
 - Using Sysinternals System Monitor (Sysmon) in a Malware Analysis Lab - SANS Digital Forensics and Incident Response Blog
 - Signature Detection with CrowdResponse - Forensic Methods
 - Mr Silverlight Drive-by Meet Volatility Timelines - Journey Into Incident Response - Corey Harrell
 - The evolution of Rovnix: new Virtual File System (VFS) - Microsoft Malware Protection Center
 - Lnk files in Email Malware Distribution - SpiderLabs Anterior
 - PUPS are Persistent - Malwarebytes Unpacked
 - Learning Exploitation with FSExploitMe - Open Security Research 
 - Keeping the RATs out: an exercise in building IOCs - Part 1 - InfoSec Handlers Diary Blog
 - Keeping the RATs out: **it happens - Part 2 - InfoSec Handlers Diary Blog
 - Keeping the RATs out: the trap is sprung - Part 3 - InfoSec Handlers Diary Blog
 - OfficeMalScanner helps identify the source of a compromise - InfoSec Handlers Diary Blog
 - Introducing Microsoft Threat Modeling Tool 2014 - The Security Development Lifecycle blog
 - toolsmith: Microsoft Threat Modeling Tool 2014 - Identify & Mitigate - HolisticInfoSec blog
 - Lorem Ipsum: Of Good & Evil, Google & China - Krebs on Security - Not at all related but very curious.
 
Cheers,
--Claus Valca
No comments:
Post a Comment