Konferenzprogramm 2022

Subpage Hero

     

Loading

Malware Hunting - Discovering techniques in PDF malicious

12 Mai 2022
Cyber Security Theatre II
Demonstrate different kind of structures in the binaries as a PDF(header/ body/cross-reference table/trailer) and performing a comparison of malicious PDFs, explaining how each session works within a binary, what are the techniques used such as packers, obfuscation with JavaScript (PDF) and more, explaining too about some anti-disassembly techniques, demonstrating as a is the action of these malware’s and where it would be possible to “include” a malicious code. By the end of this “talk” it will be clear to everyone, differences in binaries structures, how can the researcher should conduct each of these kinds of analyzes.

Sponsoren

Platinum Sponsors

  • Google Cloud
  • IONOS


 

Gold Sponsors

  • ovh cloud
  • DE-CIX
  • Couchbase
  • Alibaba
  • MariaDB
  • Aqua Security
  • Plusserver
  • Audi
  • Capgemini
  • Canonical
  • Exoscale
  • OneTrust
  • Guardicore
  • B1 Systems
  • nfon
  • Runecast

 

Silver Sponsors

  • All for One
  • Bechtle Clouds
  • Barracuda
  • EfficientIP
  • Dreger IT
  • Hornetsecurity
  • Bacula Systems
  • Bringe
  • Bulk
  • China Mobile
  • Ficolo
  • Iron Mountain
  • oMNINET
  • Tresorit
  • REPLY
  • Tufin
  • ngena
  • Lookout
  • Manage Engine
  • Nigel Frank
  • G-Core Labs
  • OpenNebula
  • Myra Security
  • Benchant
  • Artic Wolf
  • Platform.sh
  • Origina
  • Forenova

 

Theater Sponsors

  • Onapsis
  • Darktrace
  • Horizon
  • IONOS cloud
  • Google Cloud
  • Aiven
  • Plusserver


 

Registration Sponsors

  • Green Mountain


 

VIP Lounge Sponsor

  • Couchbase


 

HEADLINE & PLATINUM PARTNER

  • ECO

CONTENT PARTNER

  • Horizon Cloud

Content Partner

  • OSBA

Media PARTNER

  • The Cloud Report

 

Reisepartner

  • DEUTSCHE BAHN

Reisepartner

  • LUFTHANSA

 

Media Partner

  • cloudtango

Partner

  • Cybersicherheitsrat Deutschland e.V.

Partner

  • Etno

Partner

  • Groundbreaker

Medien Partner

  • Cyber Protection Magazine

 

Medien Partner

  • Computing Security



 

Medien Partner

  • Network Computing

 

Medien Partner

  • IT-Schulungen.com

 

Medien Partner

  • Linux Magazine

Medien Partner

  • Women in Tech

Medien Partner

  • <kes>

Medien Partner

  • TechTarget

Medien Partner

  • ADMIN Network & Security

Medien Partner

  • Enterprise Ireland

Medien Partner

  • Medien Partner

Cooperation Partner

  • Partner

Partner

  • Partner

Medien Partner

  • com professional

Medien Partner

  • Medien Partner