SlideShare une entreprise Scribd logo
1  sur  37
Télécharger pour lire hors ligne
Clamdigging:	Leveraging	ClamAV
for	Malware	Analysis	and	
Detection
2017-05-12
BSides Denver
Signature	based	detection
• Dead,	right?
• No,	it’s	not	*totally*useless	
• Of	course,	not	enough	on	its	own
• Defense	in	depth
• sigh,	I	know..
• but	srsly
• Hunting!	Tracking!	Punching!
ClamAV
• Its	2017,	why	are	we	talking	about	ClamAV
• Developed	by	Sourcefire,	acquired	by	Cisco	in	2013
• Free,	open	source	(GPL)	anti	virus	solution	for	mail,	endpoint	and	on	
demand	scanning
• Linux	/	BSD
• OSX
• Windows	
• Target	filetypes /	structures
• Decompression	/	unrolling	of	filetypes
• UPX/NSPack,	ZIP/RAR/OLE,	LZMA,	etc
ClamAV 0.99+
• Yay,	good	reasons	to	use	it!
• Updated	functionality
• Decompression	/	unrolling	of	more	filetypes!
• PCRE!
• Yara functionality!
• Yara ->	ClamAV (with	some	exceptions)
• ClamAV decompression	/	unrolling	+	YARA	logic	==	win
• Expanded	sigtool functionality!
So..	why	ClamAV?
• Why	not?	I	just	gave	you	some	good	reasons
• It’s	free
• Some	MTAs	have	Clam	functionality	built	in
• Similar	functionality	to	Yara,	just	does	some	other	stuff	better
• Quick	triage	of	attachments	
• Evil	documents,	macros,	exploits,	etc.
• Detection	capabilities
• Track	threats	across	the	board
• Classify	threats
• Known	evil	doc	vs	known	evil	macro	inside	a	doc	vs	known	Flash	exploit
• Actor	tracking
• APTz,	Builders,	Gangs,	campaigns,	etc
Integration	for	Malware	Analysis
• Automated	analysis	with	Cuckoo	Sandbox
Integration	for	Malware	Analysis
• Pipe	into	your	favorite	tools	for	sorting	results
• Know	when	things	update	and	you	start	missing	detection
• EKs
• Track	the	use	of	known	dropped	exploits	(Flash,	Silverlight,	etc)
• Macros	/	Documents
• Track	Actors	/	Campaigns
• Hunting!
• Write	generic	sigs	to	detect	evil	conditions	and	start	to	hunt
ClamAV for	Malware	Analysis	
• Multiple	lures	/	payloads,	same	macros
ClamAV for	Malware	Analysis	
• Hancitor document	keyword
ClamAV for	Malware	Analysis	
• APT	maldoc detected	by	generic	XOR	exe	sig
ClamAV for	Malware	Analysis	
• Detecting	various	image	lures	embedded	in	docs
ClamAV for	Malware	Analysis	
• Determine	common	doc	social	engineering	lure	text
• Used	~1,000	malicious	docs
• Determined	common	strings	using	statistical	analysis
• Most	common:
• Document	created	in	earlier	version	of	Microsoft	Office	(Word|Excel)
• To	(view|decrypt|display)	this	(content|document),	please	click	"Enable	
Editing"	(form|from)	the	yellow	bar	and	then	click	"Enable	Content”
• To	properly	display	the	document,	please	Enable	Content.
• To	display	the	contents	of	the	document	click	on	Enable	Content	button.
ClamAV for	Malware	Analysis
ClamAV for	Malware	Analysis
• Detecting	JS	droppers/downloaders
ClamAV for	Malware	Analysis
• Malicious	PDF
ClamAV for	Malware	Analysis
• Embedded	objects	in	docs
ClamAV for	Malware	Analysis	
• CVE-2017-0199
ClamAV for	Analysts
• Run	locally,	using	command	line	scanner
• Dissect	raw	macros	within	documents
• How	does	*ClamAV*	see	things?
• What	if	you	don’t	want	to	beautify/deobfuscate the	macros?
• Built	in	tools
• sigtool
• clamscan
• External	tools
• oletools
• viper
• Cuckoo
• lots	more
clamscan
• Command	line	version	of	ClamAV
• $clamscan –d	rules.ldb attachment
• What	I	find	most	useful:
• --debug
• Provides	a	ton	of	useful	information	on	the	target	file
• Also	will	provide	information	when	a	file	is	scanned
• --info
• Provides	a	ton	of	useful	information	on	the	target	file
• --leave-temps
• Saves	temp	files	generated	during	analysis
• UPX	packed	file	->	saves	compressed	file
sigtool
• Swiss-army	knife	for	ClamAV
• What	I	find	most	useful	are:
• --vba
• Dumps	out	the	raw	macros	inside	of	a	document
• --html-normalise
• Creates	an	ascii output	html/js file	which	is	‘normalized’	for	how	ClamAV will	read	it
• Removes	case,	whitespaces,	et
• --decode-sigs
• Feeds	in	sigs	from	stdin and	decodes	the	signatures	contents
• --hex-dump
• Reads	in	from	stdin and	spits	out	hex	dump
sigtool
• $	sigtool --vba ‘evildoc.bin’	|	sigtool --hex-dump	|	less
sigtool
• $	cat	local-rules.ldb |	sigtool --decode
Detour:	Sound	Rule	Writing	Theory
• Know	what	you	want	to	detect:
• Super	specific	content,	ideally	only	one	version	of	something	(think	hash,	or	very	
specific	contents)
• Generic	signature
• Detects	a	specific	type	of	content,	but	with	some	wiggle	room	as	far	as	things	like	variable	
names,	or	domain	names
• Loose	/	Heuristical Signature
• Detects	abnormalities,	or	the	presence	of	something	in	particular
• Sometimes	INFO	level,	but	other	times	Jumping	off	point	to	hunt
• i.e this	APT	uses	this	specific	control	to	auto-run	macros	when	this	document	opens
• Ideally,	the	perfect	rule	will	be	loose	enough	to	allow	slight	changes,	but	
specific	enough	to	capture	the	right	amount	of	maliciousness	indicative	of	
that	specific	threat
ClamAV Signatures
• Have	you	used	YARA?	It’s	pretty	similar
• Various	types	of	ClamAV signatures,	not	limited	to,	but:
• hdb (hash	database)
• Hash	based	signatures– simple
• ldb (logical	database)
• Logical	signatures– getting	trickier	now
• Boolean	logic
• Regex
• Content	modifiers
• Other	stuff	I’m	not	getting	into	because	these	I	find	most	useful
hdb signatures
• 7d8d7e1b9b4e54a113769fae842cc279:48237:EnableMacroLureImg.9.170412
md5	hash file	size message
• sigtool	--md5	<file>
Suggestions	for	sound	signatures
• Naming
• MiscreantPunch.EvilMacro.MultiPSD
L.170425
• Content
• Utilize	conditional	features
• <,	>,	=,	|,	&	for	logical	expressions
• i,	a,	w,	|	for	contents
• *	,	??	(wild	card	bytes)
• !(hex),	negate	bytes
• {x-y}, byte	ranges
• Offsets
• 0:[hex],	etc
• PCREs!
• Anchor	appropriately	to	a	content	
(i,	s,	g,	etc)
• Use	the	appropriate	flags
• ldb logic
• Take	advantage	of
• <,>,=,|,&
• Target	type
• OLE	/	Flash	/	html/js /	etc
Target	Types
src:	github.com/vrtadmin/clamav-devel/blob/master/docs/signatures.pdf
ldb signatures
• MiscreantPunch.EvilMacro.VBDL.170404; Engine:81-255,Target:2; (0&1&2&3&4&(5|6)&7&8&9&10);
4174747269627574652056425f::i;55524c446f776e6c6f6164546f46696c65::i;5c50726f6772616d73::i;5c537
46172747570::i;2e657865::i;2e72756e::i;7368656c6c::i;68747470::i;7/x3a//[^x22x27]+.exeb/si;433a::
i;9/[^x22x27]+.exeb/si
Signature	name Engine	compatibility,	and	Target	type Logical	expression
Desired	contents	used	for	detection	
as	well	as	PCRE
0:	Attribute	VB_ 1:	URLDownloadToFile 2:	Programs
More	examples...
MiscreantPunch.EvilMacro.MultiPSDL.170501;Engine:81-
255,Target:2;(0&1&2&3&4&5&6);4174747269627574652056425f::i;54686973446f63756d656e742e426f6f6b6
d61726b732e436f756e74::i;55426f756e64::i;436872::i;5368656c6c::i;466f726d2e45646974::i;52656d20{3-
20}0d0a466f726d2e45646974??2e{3-20}203d2022220d0a456c73650d0a52656d20{3-
20}0d0a466f726d2e45646974??2e{3-20}203d2022??220d0a::i
MiscreantPunch.RTF.EvilRTF.CVE-2017-0199-Obfus;Engine:81-255,Target:0;(0);0:7b5c7274!(66)*
5c6f626a757064617465
MiscreantPunch.SWF.MultiEKFlashExploit.CommonConStruct.20170505;Engine:81-
255,Target:11;(0&1&2&3&4);d030{0-500}2404c6732a;fcff7f;fcffffff07;0/xd0x30.{0,300}(?P<var1>([xd4-
xd7]|x63.))x2e.(?:[xd0-xd3]|x62.){2}x46.{2}xa0x73x2a(?P=var1)x37(?:[xd4-xd7]|x63.)(?:[xd0-
xd3]|x62.)x2e.xa1x73x2a(?P=var1)x37(?:[xd4-xd7]|x63.)(?:[xd0-
xd3]|x62.)x24x04xc6x73x2a(?P=var1)x37(?:[xd4-xd7]|x63.)(?:[xd0-
xd3]|x62.)/s;0/xa0x73(?P<s1>([xd4-xd7]|x63.))(?:[xd0-xd3]|x62.)(?P<g1>([xd0-
xd3]|x62.))x3c(?P=g1)x2e.xa1x73x2a(?P=s1)x37(?:[xd4-xd7]|x63.)(?P=g1)x24x04xc6x73x2a/s
QAing your	Sigs
• It’s	important	to	test	signatures	before	either	deploying	to	prod	or	an	
analysis	environment
• Twofold:
• Checking	your	sigs	for:
• Misspellings
• Formatting
• Errors
• Test	sigs	against	evil	docs	and	benign	docs– ensure	what	is	supposed	to	
happen..	does
I	wrote	a	sig	and	it	didn’t	fire
• Getting	things	to	fire	on	first	go	isn’t	easy
• Probably	is	your	pcre
• Debug!
• --debug
• $	clamscan –d	<rule-file>.ldb <file>	--debug
• Spits	out	a	ton	of	information	with	regards	to	how	the	engine	inspected	the	
file,	what	it	found,	and	what	conditions	exist
• Useful	for	determining	why	a	sig	didn’t	fire	or	had	problems
clam-punch
• Owned	/	Created	by	the	rule	druid	himself,	Will	Metcalf
• Github repo	containing	buckets	and	shovels
• Several	rulesets	updated	p	much	daily
• MiscreantPunch099-Low.ldb
• miscreantpunch.hdb
• MiscreantPunch099-INFO-Low.ldb
• exexor99.ldb
• Clamdigger
• Signature	generation	tool
clamdigger.py
• Python	script	for	generating	ldb ClamAV signatures
• Does	the	heavy	lifting
• Converts	content	->	hex
• Logically	formats	it
• Appends	macro	auto*	stuff	(if	you	want)
• Add/remove	modifiers
Limitations
• Encrypted	docs
• Observed	in	recent	campaigns
• Use	some	tool	to	bruteforce (or	enter	if	known)	->	send	to	clam	for	processing
• EPS	Files	detected	as	PostScript	are	blanket	ignored
• Multimatch can	be	unreliable
Resources
• ClamAV Signature	Docs	(really	important!)
• github.com/vrtadmin/clamav-devel/blob/master/docs/signatures.pdf
• Miscreant	Punch	Sigs
• github.com/wmetcalf/clam-punch
• Tutorial	on	sigwriting I	made
• www.malwarefor.me/writing-signatures-for-clam-av-0-99-a-tutorial
• SaneSecurity 3rd party	Sigs
• sanesecurity.com/usage/signatures
• ClamAV Mailing	List
• lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
• Mal(?:doc|ware)	Samples
• malware-traffic-analysis.net
• hybrid-analysis.com
• malwr.com
come	hang	w	me	(trainings)
• OISF	Training– Denver,	CO:	June	20-21st
• Mix	of	Suricata User	training	with	a	kicker	of	signature	development
• DerbyCon 7.0 – Lousiville,	KY:	September	20-21st	
• Practical	Signature	Development	for	Open	Source	IDS
• TL;DR	how	to	write	Suricata/Snort	sigs	that	don’t	suck	J
• SuriCon 2017	– Prague,	CZ:	November	15-17th
• https://suricon.net/	
• CFP	open	(talk	to	me!)
• Sponsors	needed!	(support	Open	Source!)
Questions?
• don’t	tweet	me:	@malwareforme
• don’t	email	me:	jack@malwarefor.me
• tks wmetcalf
• tks jwilliams
• tks clamav
• tks Steve	B	/	SaneSecurity
• tks BSides Denver!

Contenu connexe

Tendances

Aws glue를 통한 손쉬운 데이터 전처리 작업하기
Aws glue를 통한 손쉬운 데이터 전처리 작업하기Aws glue를 통한 손쉬운 데이터 전처리 작업하기
Aws glue를 통한 손쉬운 데이터 전처리 작업하기Amazon Web Services Korea
 
Things I wish I'd known - AtoM tips, tricks, and gotchas
Things I wish I'd known - AtoM tips, tricks, and gotchasThings I wish I'd known - AtoM tips, tricks, and gotchas
Things I wish I'd known - AtoM tips, tricks, and gotchasArtefactual Systems - AtoM
 
AWS를 통한 빅데이터 활용 고객 분석 및 캠페인 시스템 구축 사례 - 임혁용 매니저, AWS / 윤성준 차장, 현대백화점 :: AWS S...
AWS를 통한 빅데이터 활용 고객 분석 및 캠페인 시스템 구축 사례 - 임혁용 매니저, AWS / 윤성준 차장, 현대백화점 :: AWS S...AWS를 통한 빅데이터 활용 고객 분석 및 캠페인 시스템 구축 사례 - 임혁용 매니저, AWS / 윤성준 차장, 현대백화점 :: AWS S...
AWS를 통한 빅데이터 활용 고객 분석 및 캠페인 시스템 구축 사례 - 임혁용 매니저, AWS / 윤성준 차장, 현대백화점 :: AWS S...Amazon Web Services Korea
 
Amazon Personalize Event Tracker 실시간 고객 반응을 고려한 추천::김태수, 솔루션즈 아키텍트, AWS::AWS ...
Amazon Personalize Event Tracker 실시간 고객 반응을 고려한 추천::김태수, 솔루션즈 아키텍트, AWS::AWS ...Amazon Personalize Event Tracker 실시간 고객 반응을 고려한 추천::김태수, 솔루션즈 아키텍트, AWS::AWS ...
Amazon Personalize Event Tracker 실시간 고객 반응을 고려한 추천::김태수, 솔루션즈 아키텍트, AWS::AWS ...Amazon Web Services Korea
 
Advanced Design Patterns for Amazon DynamoDB - Workshop (DAT404-R1) - AWS re:...
Advanced Design Patterns for Amazon DynamoDB - Workshop (DAT404-R1) - AWS re:...Advanced Design Patterns for Amazon DynamoDB - Workshop (DAT404-R1) - AWS re:...
Advanced Design Patterns for Amazon DynamoDB - Workshop (DAT404-R1) - AWS re:...Amazon Web Services
 
Achieve Blazing-Fast Ingest Speeds with Apache Arrow
Achieve Blazing-Fast Ingest Speeds with Apache ArrowAchieve Blazing-Fast Ingest Speeds with Apache Arrow
Achieve Blazing-Fast Ingest Speeds with Apache ArrowNeo4j
 
AWS CloudFormation Best Practices
AWS CloudFormation Best PracticesAWS CloudFormation Best Practices
AWS CloudFormation Best PracticesAmazon Web Services
 
Spark and S3 with Ryan Blue
Spark and S3 with Ryan BlueSpark and S3 with Ryan Blue
Spark and S3 with Ryan BlueDatabricks
 
SAP on AWS - 국내 60개 이상 고객사가 SAP를 AWS에서 운영하는 이유
SAP on AWS - 국내 60개 이상 고객사가 SAP를 AWS에서 운영하는 이유SAP on AWS - 국내 60개 이상 고객사가 SAP를 AWS에서 운영하는 이유
SAP on AWS - 국내 60개 이상 고객사가 SAP를 AWS에서 운영하는 이유Amazon Web Services Korea
 
Amazon DynamoDB Deep Dive Advanced Design Patterns for DynamoDB (DAT401) - AW...
Amazon DynamoDB Deep Dive Advanced Design Patterns for DynamoDB (DAT401) - AW...Amazon DynamoDB Deep Dive Advanced Design Patterns for DynamoDB (DAT401) - AW...
Amazon DynamoDB Deep Dive Advanced Design Patterns for DynamoDB (DAT401) - AW...Amazon Web Services
 
AWS 해외 공공 기관 활용 사례 (윤석찬) ::: 공공기관 클라우드 도입 세미나
AWS 해외 공공 기관 활용 사례 (윤석찬) ::: 공공기관 클라우드 도입 세미나AWS 해외 공공 기관 활용 사례 (윤석찬) ::: 공공기관 클라우드 도입 세미나
AWS 해외 공공 기관 활용 사례 (윤석찬) ::: 공공기관 클라우드 도입 세미나Amazon Web Services Korea
 
Taking advantage of Prometheus relabeling
Taking advantage of Prometheus relabelingTaking advantage of Prometheus relabeling
Taking advantage of Prometheus relabelingJulien Pivotto
 
AWS Lake Formation을 통한 손쉬운 데이터 레이크 구성 및 관리 - 윤석찬 :: AWS Unboxing 온라인 세미나
AWS Lake Formation을 통한 손쉬운 데이터 레이크 구성 및 관리 - 윤석찬 :: AWS Unboxing 온라인 세미나AWS Lake Formation을 통한 손쉬운 데이터 레이크 구성 및 관리 - 윤석찬 :: AWS Unboxing 온라인 세미나
AWS Lake Formation을 통한 손쉬운 데이터 레이크 구성 및 관리 - 윤석찬 :: AWS Unboxing 온라인 세미나Amazon Web Services Korea
 
Cognitoハンズオン
CognitoハンズオンCognitoハンズオン
CognitoハンズオンShinji Miyazato
 
[Gridgain]인메모리컴퓨팅 및 국내레퍼런스 소개
[Gridgain]인메모리컴퓨팅 및 국내레퍼런스 소개 [Gridgain]인메모리컴퓨팅 및 국내레퍼런스 소개
[Gridgain]인메모리컴퓨팅 및 국내레퍼런스 소개 CJ Olivenetworks
 
서버리스 데이터 플로우 개발기 - 김재현 (Superb AI) :: AWS Community Day 2020
서버리스 데이터 플로우 개발기 - 김재현 (Superb AI) :: AWS Community Day 2020서버리스 데이터 플로우 개발기 - 김재현 (Superb AI) :: AWS Community Day 2020
서버리스 데이터 플로우 개발기 - 김재현 (Superb AI) :: AWS Community Day 2020AWSKRUG - AWS한국사용자모임
 
AWS Lambda를 기반으로한 실시간 빅테이터 처리하기
AWS Lambda를 기반으로한 실시간 빅테이터 처리하기AWS Lambda를 기반으로한 실시간 빅테이터 처리하기
AWS Lambda를 기반으로한 실시간 빅테이터 처리하기Amazon Web Services Korea
 

Tendances (20)

Searching in AtoM
Searching in AtoMSearching in AtoM
Searching in AtoM
 
Aws glue를 통한 손쉬운 데이터 전처리 작업하기
Aws glue를 통한 손쉬운 데이터 전처리 작업하기Aws glue를 통한 손쉬운 데이터 전처리 작업하기
Aws glue를 통한 손쉬운 데이터 전처리 작업하기
 
Digital Preservation with Archivematica
Digital Preservation with ArchivematicaDigital Preservation with Archivematica
Digital Preservation with Archivematica
 
Things I wish I'd known - AtoM tips, tricks, and gotchas
Things I wish I'd known - AtoM tips, tricks, and gotchasThings I wish I'd known - AtoM tips, tricks, and gotchas
Things I wish I'd known - AtoM tips, tricks, and gotchas
 
AWS를 통한 빅데이터 활용 고객 분석 및 캠페인 시스템 구축 사례 - 임혁용 매니저, AWS / 윤성준 차장, 현대백화점 :: AWS S...
AWS를 통한 빅데이터 활용 고객 분석 및 캠페인 시스템 구축 사례 - 임혁용 매니저, AWS / 윤성준 차장, 현대백화점 :: AWS S...AWS를 통한 빅데이터 활용 고객 분석 및 캠페인 시스템 구축 사례 - 임혁용 매니저, AWS / 윤성준 차장, 현대백화점 :: AWS S...
AWS를 통한 빅데이터 활용 고객 분석 및 캠페인 시스템 구축 사례 - 임혁용 매니저, AWS / 윤성준 차장, 현대백화점 :: AWS S...
 
Amazon Personalize Event Tracker 실시간 고객 반응을 고려한 추천::김태수, 솔루션즈 아키텍트, AWS::AWS ...
Amazon Personalize Event Tracker 실시간 고객 반응을 고려한 추천::김태수, 솔루션즈 아키텍트, AWS::AWS ...Amazon Personalize Event Tracker 실시간 고객 반응을 고려한 추천::김태수, 솔루션즈 아키텍트, AWS::AWS ...
Amazon Personalize Event Tracker 실시간 고객 반응을 고려한 추천::김태수, 솔루션즈 아키텍트, AWS::AWS ...
 
Advanced Design Patterns for Amazon DynamoDB - Workshop (DAT404-R1) - AWS re:...
Advanced Design Patterns for Amazon DynamoDB - Workshop (DAT404-R1) - AWS re:...Advanced Design Patterns for Amazon DynamoDB - Workshop (DAT404-R1) - AWS re:...
Advanced Design Patterns for Amazon DynamoDB - Workshop (DAT404-R1) - AWS re:...
 
Achieve Blazing-Fast Ingest Speeds with Apache Arrow
Achieve Blazing-Fast Ingest Speeds with Apache ArrowAchieve Blazing-Fast Ingest Speeds with Apache Arrow
Achieve Blazing-Fast Ingest Speeds with Apache Arrow
 
AWS CloudFormation Best Practices
AWS CloudFormation Best PracticesAWS CloudFormation Best Practices
AWS CloudFormation Best Practices
 
Spark and S3 with Ryan Blue
Spark and S3 with Ryan BlueSpark and S3 with Ryan Blue
Spark and S3 with Ryan Blue
 
SAP on AWS - 국내 60개 이상 고객사가 SAP를 AWS에서 운영하는 이유
SAP on AWS - 국내 60개 이상 고객사가 SAP를 AWS에서 운영하는 이유SAP on AWS - 국내 60개 이상 고객사가 SAP를 AWS에서 운영하는 이유
SAP on AWS - 국내 60개 이상 고객사가 SAP를 AWS에서 운영하는 이유
 
Amazon DynamoDB Deep Dive Advanced Design Patterns for DynamoDB (DAT401) - AW...
Amazon DynamoDB Deep Dive Advanced Design Patterns for DynamoDB (DAT401) - AW...Amazon DynamoDB Deep Dive Advanced Design Patterns for DynamoDB (DAT401) - AW...
Amazon DynamoDB Deep Dive Advanced Design Patterns for DynamoDB (DAT401) - AW...
 
AWS 해외 공공 기관 활용 사례 (윤석찬) ::: 공공기관 클라우드 도입 세미나
AWS 해외 공공 기관 활용 사례 (윤석찬) ::: 공공기관 클라우드 도입 세미나AWS 해외 공공 기관 활용 사례 (윤석찬) ::: 공공기관 클라우드 도입 세미나
AWS 해외 공공 기관 활용 사례 (윤석찬) ::: 공공기관 클라우드 도입 세미나
 
Taking advantage of Prometheus relabeling
Taking advantage of Prometheus relabelingTaking advantage of Prometheus relabeling
Taking advantage of Prometheus relabeling
 
AWS Lake Formation을 통한 손쉬운 데이터 레이크 구성 및 관리 - 윤석찬 :: AWS Unboxing 온라인 세미나
AWS Lake Formation을 통한 손쉬운 데이터 레이크 구성 및 관리 - 윤석찬 :: AWS Unboxing 온라인 세미나AWS Lake Formation을 통한 손쉬운 데이터 레이크 구성 및 관리 - 윤석찬 :: AWS Unboxing 온라인 세미나
AWS Lake Formation을 통한 손쉬운 데이터 레이크 구성 및 관리 - 윤석찬 :: AWS Unboxing 온라인 세미나
 
Digital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An IntroductionDigital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An Introduction
 
Cognitoハンズオン
CognitoハンズオンCognitoハンズオン
Cognitoハンズオン
 
[Gridgain]인메모리컴퓨팅 및 국내레퍼런스 소개
[Gridgain]인메모리컴퓨팅 및 국내레퍼런스 소개 [Gridgain]인메모리컴퓨팅 및 국내레퍼런스 소개
[Gridgain]인메모리컴퓨팅 및 국내레퍼런스 소개
 
서버리스 데이터 플로우 개발기 - 김재현 (Superb AI) :: AWS Community Day 2020
서버리스 데이터 플로우 개발기 - 김재현 (Superb AI) :: AWS Community Day 2020서버리스 데이터 플로우 개발기 - 김재현 (Superb AI) :: AWS Community Day 2020
서버리스 데이터 플로우 개발기 - 김재현 (Superb AI) :: AWS Community Day 2020
 
AWS Lambda를 기반으로한 실시간 빅테이터 처리하기
AWS Lambda를 기반으로한 실시간 빅테이터 처리하기AWS Lambda를 기반으로한 실시간 빅테이터 처리하기
AWS Lambda를 기반으로한 실시간 빅테이터 처리하기
 

Similaire à Clamdigging: Leveraging ClamAV for Malware Analysis and Detection

Safely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAMSafely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAMJonathan Katz
 
Get Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAMGet Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAMJonathan Katz
 
Automatic tool for static analysis
Automatic tool for static analysisAutomatic tool for static analysis
Automatic tool for static analysisChong-Kuan Chen
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Responsepm123008
 
Free and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSEFree and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSEEllie Robinson
 
Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)Oren Eini
 
Search in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the FieldSearch in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the FieldAlex Moundalexis
 
Encryption in php
Encryption in phpEncryption in php
Encryption in phpsana mateen
 
Messaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkMessaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkTomas Doran
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authenticationMohammed Adam
 
Neo4 + Grails
Neo4 + GrailsNeo4 + Grails
Neo4 + Grailsstasimus
 
BinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in HadoopBinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in HadoopJason Trost
 
CNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password AttacksCNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password AttacksSam Bowne
 
Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Mike King
 

Similaire à Clamdigging: Leveraging ClamAV for Malware Analysis and Detection (20)

Hash cat
Hash catHash cat
Hash cat
 
Safely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAMSafely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAM
 
Get Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAMGet Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAM
 
Why ruby and rails
Why ruby and railsWhy ruby and rails
Why ruby and rails
 
Automatic tool for static analysis
Automatic tool for static analysisAutomatic tool for static analysis
Automatic tool for static analysis
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
 
2021_TLSH_SOC_pub.pdf
2021_TLSH_SOC_pub.pdf2021_TLSH_SOC_pub.pdf
2021_TLSH_SOC_pub.pdf
 
rspamd-slides
rspamd-slidesrspamd-slides
rspamd-slides
 
Free and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSEFree and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSE
 
Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)
 
KeyValue Stores
KeyValue StoresKeyValue Stores
KeyValue Stores
 
Search in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the FieldSearch in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the Field
 
Encryption in php
Encryption in phpEncryption in php
Encryption in php
 
Neo4J and Grails
Neo4J and GrailsNeo4J and Grails
Neo4J and Grails
 
Messaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkMessaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new framework
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authentication
 
Neo4 + Grails
Neo4 + GrailsNeo4 + Grails
Neo4 + Grails
 
BinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in HadoopBinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in Hadoop
 
CNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password AttacksCNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password Attacks
 
Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Clamdigging: Leveraging ClamAV for Malware Analysis and Detection