FileMood

Download BotConf

BotConf

Name

BotConf

 DOWNLOAD Copy Link

Total Size

6.9 GB

Total Files

206

Hash

C6793BBCB4B67D042C4A284A60A5F2FC5D424902

/BotConf 2013/

00 - Botconf 2013 live stream.mp4

2.1 MB

02 - Thomas Siebert - Advanced Techniques in Modern Banking Trojans.mp4

58.5 MB

06 - Vasileios Friligkos - Back to life, back to correlation.mp4

37.0 MB

07 - Enrico Branca - Using cyber intelligence to detect and localize botnets.mp4

62.4 MB

08 - Prakhar Prasad and Himanshu Sharma - Zombies in your browser.mp4

68.6 MB

09 - Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.mp4

104.9 MB

10 - S Duquette - The Home and CDorked campaigns Widespread Malicious Modification of Webservers for Mass Malware Distribution.mp4

107.3 MB

11 - Maciej Kotowicz - Malware Calling.mp4

69.4 MB

12 - Ivan Fontarensky - Disass.mp4

39.9 MB

13 - Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.mp4

33.9 MB

14 - Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.mp4

78.1 MB

15 - Julien Lavesque - Perdix a framework for realtime behavioral evaluation of security threats in cloud computing environment.mp4

54.7 MB

17 - Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.mp4

160.4 MB

18 - David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.mp4

109.9 MB

19 - Paul Rascagne - APT1 Technical Backstage.mp4

117.6 MB

20 - Jaap van Oss - Europol and European law enforcement action against botnets.mp4

139.0 MB

22 - Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.mp4

113.3 MB

23 - S Larinier and Guillaume Arcas - Exploit Krawler New Weapon againt Exploits Kits.mp4

133.9 MB

24 - Jason Jones - BladeRunner Adventures in Tracking Botnets.mp4

158.3 MB

25 - Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.mp4

156.8 MB

/.../BotConf 2014 presentations/

2014-1.2-Keynote-United-Kingdom-National-crime-agency-on-botnet-takedowns.pdf

11.0 MB

2014-1.3-Semantic-Exploration-of-Binaries.pdf

745.9 KB

2014-1.5-The-Many-Faces-of-Mevade.pdf

13.3 MB

2014-1.6-Splicing-and-Dicing-2014-Examining-this-Years-Botnet-Attack-Trends1.pdf

3.0 MB

2014-1.7-Virus-Tracker.pdf

1.5 MB

2014-1.8-How-to-Dismantle-a-Botnet-the-Legal-Behind-the-Scenes.pdf

920.0 KB

2014-2.1-Workshop-Feedback-on-Windbg-Usage.pdf

1.2 MB

2014-2.10-Chinese-Chicken-Multiplatform-DDoS-Botnets.pdf

2.4 MB

2014-2.11-Ponmocup-Hunter-2.0-The-Sequel.pdf

2.8 MB

2014-2.2-A-Timeline-of-Mobile-Botnets-PAPER.pdf

1.5 MB

2014-2.2-A-Timeline-of-Mobile-Botnets.pdf

6.3 MB

2014-2.4-CONDENSER-A-Graph-Based-Approach-for-Detecting-Botnets-PAPER.pdf

172.0 KB

2014-2.4-CONDENSER-A-Graph-Based-Approach-for-Detecting-Botnets.pdf

2.3 MB

2014-2.6-Middle-Income-Malware-Actors-in-Poland-VBKlip-and-Beyond.pdf

1.9 MB

2014-2.7-Bypassing-Sandboxes-for-Fun.pdf

2.2 MB

2014-2.9-The-Russian-DDoS-One-Booters-to-Botnets.pdf

28.7 MB

2014-3.1-A-New-Look-at-Fast-Flux-Proxy-Networks.pdf

9.9 MB

2014-3.3-DNS-Analytics-Case-Study.pdf

3.2 MB

2014-3.4-Keynote-A-tour-in-the-Analysis-of-X86-Botnets-at-loria.fr.pdf

1.8 MB

2014-3.6-ZeuS-Meets-VM-The-Story-so-Far.pdf

6.0 MB

2014-LT1-5-Martijn-Grooten-Qakbot.pdf

248.4 KB

2014-LT2-1-Lukasz-Siewierski-Somehow-Unusual-Android-Malware-Sample.pdf

321.2 KB

2014-LT2-5-Maxime-Morin-Radare2.pdf

1.4 MB

/.../BotConf 2014 videos/

Dennis Schwarz - The Russian DDoS One Booters to Botnets.mp4

256.5 MB

Dennis Schwarz - The Russian DDoS One Booters to Botnets.srt

44.7 KB

Karine e Silva - How to Dismantle a Botnet the Legal Behind the Scenes.mp4

83.9 MB

Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.mp4

95.2 MB

Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.srt

54.0 KB

Osama Kamal - DNS Analytics, Case Study.mp4

36.7 MB

Paul Jung - Bypassing Sandboxes for Fun.mp4

76.6 MB

Pedro Camelo and Joao Moura - CONDENSER A Graph-Based Approach for Detecting Botnets.mp4

227.2 MB

Peter Kalnai and Jaromir Horejsi - Chinese Chicken Multiplatform DDoS Botnets.mp4

270.9 MB

Peter Kleissner - Virus Tracker.mp4

369.1 MB

/.../BotConf 2015 presentations/

2.htm

17.6 KB

3.htm

19.5 KB

4.htm

17.9 KB

7XM167MJ.htm

28.9 KB

CJYV2O6G.htm

59.9 KB

OK-K01-Margarita-Louca-Botnet-takedowns-cooperation.pdf

1.8 MB

OK-LT01-Kurtis-ArmourBrowser-and-Environment-Hardening.pdf

912.8 KB

OK-LT02-Christ-Dietrich-Stegoloader.pdf

138.9 KB

OK-LT05-Martijn-Grooten-The-State-of-Spam-in-2015.pdf

225.5 KB

OK-LT06-Hugo-Rifflet-Python-log-parser-Flask-Log-Map.pdf

543.9 KB

OK-LT07-Robin-David-Dynamic-symbolic-execution-for-malware-reverse-engineering.pdf

329.8 KB

OK-LT08-Roy-Firestein-Cymon.pdf

1.4 MB

OK-LT09-Xavier-Mertens-Automatic-MIME-attachments-triage.pdf

534.4 KB

OK-LT10-Wayne-Crowder-Wrestling-elephants-Tackling-malware-research-issues.pdf

858.2 KB

OK-LT11-Johanne-Ulloa-Nolimitsecu.pdf

1.1 MB

OK-P01-Maarten-van-Dantzig-Yonathan-Klijnsma-Ponmocup.pdf

12.5 MB

OK-P03-Frank-Denis-The-missing-piece-in-threat-intelligence.pdf

15.8 MB

OK-P04-Marc-Doudiet-Honey-Where-is-my-PoS.pdf

1.3 MB

OK-P05-John-Bambenek-Takedowns-Case-studies-and-what-we-all-could-be-doing-better.pdf

3.4 MB

OK-P06-Plohmann-DGArchive.pdf

739.9 KB

OK-P07-Jose-Esparza-Travelling-to-the-far-side-of-Andromeda-2.pdf

1.4 MB

OK-P08-Mikhail-Kuzin-Nikita-Buchka-Whose-phone-is-in-your-pocket.pdf

2.4 MB

OK-P09-Malatras_Beslay_Botconf2015.pdf

986.9 KB

OK-P10-Paul-Jung-Box-BotNets.pdf

3.9 MB

OK-P11-Matthieu-Kaczmarek-Malware-Instrumentation-Application-to-Regin-Analysis.pdf

1.2 MB

OK-P12-Mark-Graham-Practical-Experiences-of-Building-an-IPFIX-Based-Open-Source-Botnet-Detector.pdf

1.5 MB

OK-P13-Liu-Ya-Automatically-Classify-Unknown-Bots-by-The-Register-Messages.pdf

926.3 KB

OK-P14-Yonathan-Klijnsma-The-Story-of-CryptoWall-a-historical-analysis-of-a-large-scale-cryptographic-ransomware-threat.pdf

31.0 MB

OK-P15-Renaud-Bidou-Powered-by-Javascript.pdf

3.3 MB

OK-P17-Chaouki-Kasmi-Jose-Lopes-Esteves-Philippe-Valembois-Air-Gap-Command-Control-IEMI.pdf

1.9 MB

OK-P18-Kleissner-Sality.pdf

1.6 MB

OK-P19-Olivier-Bilodeau-A-moose-once-bit-my-honeypot.pdf

7.1 MB

OK-P20-Thomas-Barabosch-Behavior-driven-development-in-malware-analysis.pdf

2.2 MB

OK-S01-Alex-Chailytko-Alex-Trafimcuk-DGA-clustering-and-analysis-mastering-modern-evolving-threats.pdf

604.9 KB

OK-S02-Zoltan-Balazs-Sandbox_mapping_botconf.pdf

1.4 MB

OK-S04-Veronica-Valeros-Make-it-count_v3.pdf

3.6 MB

OK-S05-Josiah-Hagen-Building-a-better-botnet-DGA-mousetrap-separating-mice-rats-and-cheese-in-DNS-data.pdf

2.2 MB

a-moose-once-bit-my-honeypot.htm

35.3 KB

dga-domain-classification.htm

70.1 KB

/BotConf 2016/

Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.mp4

39.1 MB

Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.mp4

23.7 MB

Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.mp4

46.3 MB

Browser based Malware Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.mp4

33.7 MB

Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.mp4

24.2 MB

Function Identification and Recovery Signature Tool - Angel Villegas.mp4

57.7 MB

How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.mp4

37.8 MB

ISFB, Still Live and Kicking - Maciej Kotowicz.mp4

46.8 MB

Improve DDoS Botnet Tracking With Honeypots - Ya Liu.mp4

28.3 MB

LURK The Story about Five Years of Activity - Vladimir Kropotov.mp4

45.2 MB

MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.mp4

1.4 GB

Preventing File Based Botnet Persistence and Growth - Kurtis Armour.mp4

33.1 MB

Snoring Is Optional The Economics of Cyber Insurance and Malware - Wayne Crowder.mp4

68.2 MB

Tracking Exploit Kits - John Bambenek - YouTube.mp4

45.0 MB

Vawtrak Banking Trojan A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.mp4

45.9 MB

/.../BotConf 2016 presentations/

2016-LT01-Unprotect_Roccia.pdf

984.6 KB

2016-LT02-Osiris-Poulson.pdf

1.4 MB

2016-LT03-7547-Mertens.pdf

1.6 MB

2016-LT05-Sisyphe-AUFFRET.pdf

43.2 KB

2016-LT06-KK-e-Silva.pdf

728.0 KB

2016-LT07-Android-Botnet-Analysis-Alothman.pdf

3.7 MB

2016-LT08-Botconf2016LightningTalkMartijnGrooten.pdf

160.5 KB

2016-LT09-TrickBot-Adams.pdf

1.2 MB

2016-LT11-dotNET-sample-analysis-Rifflet.pdf

840.1 KB

INV02-Ransomware-BEEK.pdf

22.4 MB

PR01-Visiting-Bears-Den-CAMPOS.pdf

3.4 MB

PR02-LURK-KROPOTOV.pdf

6.8 MB

PR03-Browser-based-Malware-Evolution-and-Prevention-KOVALEV-SIDOROV.pdf

1.8 MB

PR04-ESOM-DNS-MANDRYSCH.pdf

516.6 KB

PR05-Vawtrak-ACIN-BHAT.pdf

3.8 MB

PR06-SnoringOptional-WC-Botconf2016.pdf

6.9 MB

PR08-MOOSE-BILODEAU-PAQUET-CLOUSTON.pdf

4.8 MB

PR09-Tracking-exploit-kits-Bambenek.pdf

1.7 MB

PR10-Improve-DDoS-Botnet-Tracking-With-Honeypots-LIU.pdf

697.3 KB

PR11-Function-Identification-and-Recovery-Signature-Tool-Villegas.pdf

869.0 KB

PR12-Sysmon-UELTSCHI.pdf

4.6 MB

PR14-Tete-aTete_with_RSA_Bots_presentation-FRIESS.pdf

393.5 KB

PR15-Takedown-ISP-QUANG-TRAN-MINH.pdf

449.6 KB

PR16-Detecting-the-Behavioral-Relationships-of-Malware-Connections-GARCIA.pdf

5.9 MB

PR17-Analysis-of-Free-Movies-and-Series-Websites-Guided-by-Users-Search-Terms-BENTHIN.pdf

1.1 MB

PR18-Nymaim-ORTEGA.pdf

1.1 MB

PR20-ISFB-Kotowicz-.pdf

1.1 MB

PR21-Preventing-File-Based-Botnet-Growth-and-Persistence-ARMOUR.pdf

6.4 MB

WS04-Getting-Your-Hands-Dirty-How-to-Analyze-the-Behavior-of-Malware-Traffic-and-Web-Connections-VALEROS-GARCIA.pdf

186.0 KB

/BotConf 2017/

Advanced Threat Hunting - Robert Simmons.en.transcribed.srt

126.6 KB

Advanced Threat Hunting - Robert Simmons.mp4

39.7 MB

An Overview of the CMS Brute-Forcing Malware Landscape - Anna Shirokova.en.transcribed.srt

66.3 KB

An Overview of the CMS Brute-Forcing Malware Landscape - Anna Shirokova.mp4

22.3 MB

Automation Of Internet-Of-Things Botnets Takedown By An ISP - Sébastien Mériot.en.transcribed.srt

49.7 KB

Automation Of Internet-Of-Things Botnets Takedown By An ISP - Sébastien Mériot.mp4

25.1 MB

Hunting Attacker Activities - Keisuke Muda - Shusei Tomonaga.en.transcribed.srt

57.7 KB

Hunting Attacker Activities - Keisuke Muda - Shusei Tomonaga.mp4

31.3 MB

Malpedia A Collaborative Effort to Inventorize the Malware Landscape - Daniel Plohmann.en.transcribed.srt

179.1 KB

Malpedia A Collaborative Effort to Inventorize the Malware Landscape - Daniel Plohmann.mp4

49.7 MB

Malware Uncertainty Principle - Maria Jose Erquiaga.en.transcribed.srt

30.3 KB

Malware Uncertainty Principle - Maria Jose Erquiaga.mp4

12.5 MB

Malware, Penny Stocks, Pharma Spam - Necurs Delivers - Jaeson Schultz.en.transcribed.srt

78.2 KB

Malware, Penny Stocks, Pharma Spam - Necurs Delivers - Jaeson Schultz.mp4

27.4 MB

PWS, Common, Ugly but Effective - Paul Jung.mp4

26.0 MB

RetDec An Open-Source Machine-Code Decompiler - Jakub Kroustek, Peter Matula.mp4

27.5 MB

The (makes me) Wannacry Investigation - Alan Neville.en.transcribed.srt

82.2 KB

The (makes me) Wannacry Investigation - Alan Neville.mp4

25.4 MB

/BotConf 2018/

An Overview of the CMS Brute-Forcing Malware Landscape - Anna Shirokova.en.transcribed.srt

43.1 KB

An Overview of the CMS Brute-Forcing Malware Landscape - Anna Shirokova.mp4

48.3 MB

Augmented Intelligence to Scale Humans Fighting Botnets - Amir Asiaee.en.transcribed.srt

33.9 KB

Augmented Intelligence to Scale Humans Fighting Botnets - Amir Asiaee.mp4

58.9 MB

CAN Bus Basics With Hands On Fuzzing - Ian Tabor.en.transcribed.srt

58.5 KB

CAN Bus Basics With Hands On Fuzzing - Ian Tabor.mp4

178.4 MB

How to detect watering holes - Félix Aimé.en.transcribed.srt

34.7 KB

How to detect watering holes - Félix Aimé.mp4

61.0 MB

Hunting Attacker Activities - Keisuke Muda - Shusei Tomonaga.en.transcribed.srt

37.3 KB

Hunting Attacker Activities - Keisuke Muda - Shusei Tomonaga.mp4

63.0 MB

Hunting Down Gooligan - Elie Bursztein, Oren Koriat.en.transcribed.srt

57.5 KB

Hunting Down Gooligan - Elie Bursztein, Oren Koriat.mp4

62.7 MB

Malpedia A Collaborative Effort to Inventorize the Malware Landscape - Daniel Plohmann.en.transcribed.srt

114.0 KB

Malpedia A Collaborative Effort to Inventorize the Malware Landscape - Daniel Plohmann.mp4

104.3 MB

Malware Uncertainty Principle - Maria Jose Erquiaga.en.transcribed.srt

19.5 KB

Malware Uncertainty Principle - Maria Jose Erquiaga.mp4

28.5 MB

Malware, Penny Stocks, Pharma Spam - Necurs Delivers - Jaeson Schultz.en.transcribed.srt

51.3 KB

Malware, Penny Stocks, Pharma Spam - Necurs Delivers - Jaeson Schultz.mp4

52.3 MB

PWS, Common, Ugly but Effective - Paul Jung.mp4

49.6 MB

RetDec An Open-Source Machine-Code Decompiler - Jakub Kroustek, Peter Matula.mp4

55.4 MB

The (makes me) Wannacry Investigation - Alan Neville.en.transcribed.srt

52.6 KB

The (makes me) Wannacry Investigation - Alan Neville.mp4

51.6 MB

/BotConf 2020/

A Proposed Civil Liability Framework for Disrupting Botnets, a particular focus on Smart Devices.eng.srt

52.6 KB

A Proposed Civil Liability Framework for Disrupting Botnets, a particular focus on Smart Devices.mp4

35.0 MB

A detailed look into the Mozi P2P IoT botnet.eng.srt

31.2 KB

A detailed look into the Mozi P2P IoT botnet.mp4

10.7 MB

APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications.eng.srt

48.3 KB

APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications.mp4

16.3 MB

An overview of the Botnet Simulation Framework.eng.srt

40.2 KB

An overview of the Botnet Simulation Framework.mp4

12.5 MB

Fluxxy Dissection.eng.srt

45.4 KB

Fluxxy Dissection.mp4

26.5 MB

Fritzfrog A Story of a Unique P2P Botnet.eng.srt

47.5 KB

Fritzfrog A Story of a Unique P2P Botnet.mp4

17.6 MB

Hunting MageCart Skimmers.eng.srt

35.0 KB

Hunting MageCart Skimmers.mp4

10.7 MB

Hunting the Quasar Family - How to Hunt Malware Family.eng.srt

34.7 KB

Hunting the Quasar Family - How to Hunt Malware Family.mp4

22.4 MB

Inline Detection of Copy-Paste Botnet C&C.eng.srt

41.7 KB

Inline Detection of Copy-Paste Botnet C&C.mp4

19.6 MB

The fall of Domino - a preinstalled hostile downloader.eng.srt

42.8 KB

The fall of Domino - a preinstalled hostile downloader.mp4

16.1 MB

Tracking Unsafe Services that are Hosted by Bots using IP Reputation.eng.srt

27.0 KB

Tracking Unsafe Services that are Hosted by Bots using IP Reputation.mp4

12.0 MB

Turla operations from a front row seat.eng.srt

41.0 KB

Turla operations from a front row seat.mp4

14.4 MB

Your aaS is on fire, or how threat actors (ab)use cloud providers.eng.srt

49.3 KB

Your aaS is on fire, or how threat actors (ab)use cloud providers.mp4

18.8 MB

xOSSig Leveraging OS Diversity to Automatically Extract Malware Code Signatures.eng.srt

50.7 KB

xOSSig Leveraging OS Diversity to Automatically Extract Malware Code Signatures.mp4

16.7 MB

/

BotConf logo.png

186.4 KB

BotConf thank you.txt

1.0 KB

 

Total files 206


Copyright © 2024 FileMood.com