ºÝºÝߣshows by User: l0ganbr / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: l0ganbr / Fri, 08 Nov 2019 00:28:08 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: l0ganbr Nullbyte 6ed. 2019 /l0ganbr/nullbyte-6ed-2019 nullbyte-191108002808
Esta apresentação é baseada em uma pesquisa que publiquei em 2015 que tratava de malware do tipo mach-o, e o aumento de visibilidade do macOS como novo alvo. Nesta nova pesquisa, a ideia é mostrar algumas dicas sobre internals, kernel e principais ameaças que o macOS vem enfrentando.]]>

Esta apresentação é baseada em uma pesquisa que publiquei em 2015 que tratava de malware do tipo mach-o, e o aumento de visibilidade do macOS como novo alvo. Nesta nova pesquisa, a ideia é mostrar algumas dicas sobre internals, kernel e principais ameaças que o macOS vem enfrentando.]]>
Fri, 08 Nov 2019 00:28:08 GMT /l0ganbr/nullbyte-6ed-2019 l0ganbr@slideshare.net(l0ganbr) Nullbyte 6ed. 2019 l0ganbr Esta apresentação é baseada em uma pesquisa que publiquei em 2015 que tratava de malware do tipo mach-o, e o aumento de visibilidade do macOS como novo alvo. Nesta nova pesquisa, a ideia é mostrar algumas dicas sobre internals, kernel e principais ameaças que o macOS vem enfrentando. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nullbyte-191108002808-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Esta apresentação é baseada em uma pesquisa que publiquei em 2015 que tratava de malware do tipo mach-o, e o aumento de visibilidade do macOS como novo alvo. Nesta nova pesquisa, a ideia é mostrar algumas dicas sobre internals, kernel e principais ameaças que o macOS vem enfrentando.
Nullbyte 6ed. 2019 from Ricardo L0gan
]]>
171 0 https://cdn.slidesharecdn.com/ss_thumbnails/nullbyte-191108002808-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
H2HC - R3MF /slideshow/h2hc-r3mf/67700874 h2hc-r3mf-161027021536
R3v3rs1ng on Mach-o File Part of this presentation is based on research published in 2015, which was demonstrated the increasing spread of malware binaries mach-o and how to analyze the type of these binary. In this presentation, we will explain with more detail the structure of Binary using debuggers tools and reverse engineering techniques.The knowledge gained will be useful from analysis of malware as also for challenges type crackmes on CTFs. Demo-01 Reversing Mach-o File Demo Crackme https://www.youtube.com/watch?v=RdE-QkY-1aw Demo-02 Reversing Mach-o Malware Keranger https://www.youtube.com/watch?v=UNJ8hxk60_s]]>

R3v3rs1ng on Mach-o File Part of this presentation is based on research published in 2015, which was demonstrated the increasing spread of malware binaries mach-o and how to analyze the type of these binary. In this presentation, we will explain with more detail the structure of Binary using debuggers tools and reverse engineering techniques.The knowledge gained will be useful from analysis of malware as also for challenges type crackmes on CTFs. Demo-01 Reversing Mach-o File Demo Crackme https://www.youtube.com/watch?v=RdE-QkY-1aw Demo-02 Reversing Mach-o Malware Keranger https://www.youtube.com/watch?v=UNJ8hxk60_s]]>
Thu, 27 Oct 2016 02:15:36 GMT /slideshow/h2hc-r3mf/67700874 l0ganbr@slideshare.net(l0ganbr) H2HC - R3MF l0ganbr R3v3rs1ng on Mach-o File Part of this presentation is based on research published in 2015, which was demonstrated the increasing spread of malware binaries mach-o and how to analyze the type of these binary. In this presentation, we will explain with more detail the structure of Binary using debuggers tools and reverse engineering techniques.The knowledge gained will be useful from analysis of malware as also for challenges type crackmes on CTFs. Demo-01 Reversing Mach-o File Demo Crackme https://www.youtube.com/watch?v=RdE-QkY-1aw Demo-02 Reversing Mach-o Malware Keranger https://www.youtube.com/watch?v=UNJ8hxk60_s <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/h2hc-r3mf-161027021536-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> R3v3rs1ng on Mach-o File Part of this presentation is based on research published in 2015, which was demonstrated the increasing spread of malware binaries mach-o and how to analyze the type of these binary. In this presentation, we will explain with more detail the structure of Binary using debuggers tools and reverse engineering techniques.The knowledge gained will be useful from analysis of malware as also for challenges type crackmes on CTFs. Demo-01 Reversing Mach-o File Demo Crackme https://www.youtube.com/watch?v=RdE-QkY-1aw Demo-02 Reversing Mach-o Malware Keranger https://www.youtube.com/watch?v=UNJ8hxk60_s
H2HC - R3MF from Ricardo L0gan
]]>
390 4 https://cdn.slidesharecdn.com/ss_thumbnails/h2hc-r3mf-161027021536-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Andsec Reversing on Mach-o File /slideshow/andsec-reversing-on-macho-file/62641318 andsec-r3mf-160602032329
Part of this presentation is based on research published in 2015, which was demonstrated the increasing spread of malware binaries mach-o and how to analyze the type of these binary. In this presentation, we will explain with more detail the structure of Binary using debuggers tools and reverse engineering techniques.The knowledge gained will be useful from analysis of malware as also for challenges type crackmes on CTFs.]]>

Part of this presentation is based on research published in 2015, which was demonstrated the increasing spread of malware binaries mach-o and how to analyze the type of these binary. In this presentation, we will explain with more detail the structure of Binary using debuggers tools and reverse engineering techniques.The knowledge gained will be useful from analysis of malware as also for challenges type crackmes on CTFs.]]>
Thu, 02 Jun 2016 03:23:29 GMT /slideshow/andsec-reversing-on-macho-file/62641318 l0ganbr@slideshare.net(l0ganbr) Andsec Reversing on Mach-o File l0ganbr Part of this presentation is based on research published in 2015, which was demonstrated the increasing spread of malware binaries mach-o and how to analyze the type of these binary. In this presentation, we will explain with more detail the structure of Binary using debuggers tools and reverse engineering techniques.The knowledge gained will be useful from analysis of malware as also for challenges type crackmes on CTFs. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/andsec-r3mf-160602032329-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Part of this presentation is based on research published in 2015, which was demonstrated the increasing spread of malware binaries mach-o and how to analyze the type of these binary. In this presentation, we will explain with more detail the structure of Binary using debuggers tools and reverse engineering techniques.The knowledge gained will be useful from analysis of malware as also for challenges type crackmes on CTFs.
Andsec Reversing on Mach-o File from Ricardo L0gan
]]>
1981 6 https://cdn.slidesharecdn.com/ss_thumbnails/andsec-r3mf-160602032329-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Roadsec 2016 Mach-o A New Threat /slideshow/roadsec-2016-macho-a-new-threat/61415165 roadsec2016-mach-oanewthreat-160427124143
With the advent of large malware in recent years, systems OS X can be vectors of attack us-ing Mach-O binaries. This presentation will illustrate the dissection of something malicious and also identifica-tion,analysis and some possibilities for mitigation.]]>

With the advent of large malware in recent years, systems OS X can be vectors of attack us-ing Mach-O binaries. This presentation will illustrate the dissection of something malicious and also identifica-tion,analysis and some possibilities for mitigation.]]>
Wed, 27 Apr 2016 12:41:42 GMT /slideshow/roadsec-2016-macho-a-new-threat/61415165 l0ganbr@slideshare.net(l0ganbr) Roadsec 2016 Mach-o A New Threat l0ganbr With the advent of large malware in recent years, systems OS X can be vectors of attack us-ing Mach-O binaries. This presentation will illustrate the dissection of something malicious and also identifica-tion,analysis and some possibilities for mitigation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/roadsec2016-mach-oanewthreat-160427124143-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With the advent of large malware in recent years, systems OS X can be vectors of attack us-ing Mach-O binaries. This presentation will illustrate the dissection of something malicious and also identifica-tion,analysis and some possibilities for mitigation.
Roadsec 2016 Mach-o A New Threat from Ricardo L0gan
]]>
657 5 https://cdn.slidesharecdn.com/ss_thumbnails/roadsec2016-mach-oanewthreat-160427124143-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bsides SP 2015 - Mach-O - A New Threat /slideshow/bsides-sp-2015-macho-a-new-threat/53874061 bsidessp2015-mach-o-151013122030-lva1-app6891
Com o grande advento de malwares nos últimos anos, sistemas com OS X podem ser veto-res de ataques usando binários Mach-O. Esta apresentação ilustra a dissecação de algo malicioso, bem como analise e algumas possibilidades para mitigação.]]>

Com o grande advento de malwares nos últimos anos, sistemas com OS X podem ser veto-res de ataques usando binários Mach-O. Esta apresentação ilustra a dissecação de algo malicioso, bem como analise e algumas possibilidades para mitigação.]]>
Tue, 13 Oct 2015 12:20:30 GMT /slideshow/bsides-sp-2015-macho-a-new-threat/53874061 l0ganbr@slideshare.net(l0ganbr) Bsides SP 2015 - Mach-O - A New Threat l0ganbr Com o grande advento de malwares nos últimos anos, sistemas com OS X podem ser veto-res de ataques usando binários Mach-O. Esta apresentação ilustra a dissecação de algo malicioso, bem como analise e algumas possibilidades para mitigação. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bsidessp2015-mach-o-151013122030-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Com o grande advento de malwares nos últimos anos, sistemas com OS X podem ser veto-res de ataques usando binários Mach-O. Esta apresentação ilustra a dissecação de algo malicioso, bem como analise e algumas possibilidades para mitigação.
Bsides SP 2015 - Mach-O - A New Threat from Ricardo L0gan
]]>
489 6 https://cdn.slidesharecdn.com/ss_thumbnails/bsidessp2015-mach-o-151013122030-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Latinoware 2015 Mach-O /slideshow/latinoware-2015-macho/53873440 latinoware2015-mach-o-151013120624-lva1-app6892
With the advent of large malware in recent years, systems OS X can be vectors of attack using Mach-O binaries. This presentation will illustrate the dissection of something malicious and also identification,analysis and some possibilities for mitigation.]]>

With the advent of large malware in recent years, systems OS X can be vectors of attack using Mach-O binaries. This presentation will illustrate the dissection of something malicious and also identification,analysis and some possibilities for mitigation.]]>
Tue, 13 Oct 2015 12:06:24 GMT /slideshow/latinoware-2015-macho/53873440 l0ganbr@slideshare.net(l0ganbr) Latinoware 2015 Mach-O l0ganbr With the advent of large malware in recent years, systems OS X can be vectors of attack using Mach-O binaries. This presentation will illustrate the dissection of something malicious and also identification,analysis and some possibilities for mitigation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/latinoware2015-mach-o-151013120624-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With the advent of large malware in recent years, systems OS X can be vectors of attack using Mach-O binaries. This presentation will illustrate the dissection of something malicious and also identification,analysis and some possibilities for mitigation.
Latinoware 2015 Mach-O from Ricardo L0gan
]]>
276 8 https://cdn.slidesharecdn.com/ss_thumbnails/latinoware2015-mach-o-151013120624-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bhack 2015 - mach-o Uma Nova Ameaça https://pt.slideshare.net/slideshow/bhack-2015-macho-uma-nova-ameaa/49617432 bhack2015-mach-o-150619220911-lva1-app6891
Com o grande advento de malwares nos últimos anos, sistemas com OS X podem ser vetores de ataques usando binários Mach-O, esta apresentação ilustra dissecação de algo malícioso bem como analise e algumas possibilidades para mitigação.]]>

Com o grande advento de malwares nos últimos anos, sistemas com OS X podem ser vetores de ataques usando binários Mach-O, esta apresentação ilustra dissecação de algo malícioso bem como analise e algumas possibilidades para mitigação.]]>
Fri, 19 Jun 2015 22:09:11 GMT https://pt.slideshare.net/slideshow/bhack-2015-macho-uma-nova-ameaa/49617432 l0ganbr@slideshare.net(l0ganbr) Bhack 2015 - mach-o Uma Nova Ameaça l0ganbr Com o grande advento de malwares nos últimos anos, sistemas com OS X podem ser vetores de ataques usando binários Mach-O, esta apresentação ilustra dissecação de algo malícioso bem como analise e algumas possibilidades para mitigação. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bhack2015-mach-o-150619220911-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Com o grande advento de malwares nos últimos anos, sistemas com OS X podem ser vetores de ataques usando binários Mach-O, esta apresentação ilustra dissecação de algo malícioso bem como analise e algumas possibilidades para mitigação.
from Ricardo L0gan
]]>
266 4 https://cdn.slidesharecdn.com/ss_thumbnails/bhack2015-mach-o-150619220911-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Desofuscando um webshell em php h2hc Ed.9 https://pt.slideshare.net/slideshow/desofuscando-um-webshell-em-php-h2hc-ed9/48569201 desofuscandoumwebshellemphp-h2hc-ed-150525141108-lva1-app6892
]]>

]]>
Mon, 25 May 2015 14:11:08 GMT https://pt.slideshare.net/slideshow/desofuscando-um-webshell-em-php-h2hc-ed9/48569201 l0ganbr@slideshare.net(l0ganbr) Desofuscando um webshell em php h2hc Ed.9 l0ganbr <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/desofuscandoumwebshellemphp-h2hc-ed-150525141108-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
from Ricardo L0gan
]]>
611 1 https://cdn.slidesharecdn.com/ss_thumbnails/desofuscandoumwebshellemphp-h2hc-ed-150525141108-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-l0ganbr-48x48.jpg?cb=1643232136 Specialties: - Network security; - IT / Security Architecture; - Penetration Test. -Malware Research. www.0code.com.br https://cdn.slidesharecdn.com/ss_thumbnails/nullbyte-191108002808-thumbnail.jpg?width=320&height=320&fit=bounds l0ganbr/nullbyte-6ed-2019 Nullbyte 6ed. 2019 https://cdn.slidesharecdn.com/ss_thumbnails/h2hc-r3mf-161027021536-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/h2hc-r3mf/67700874 H2HC - R3MF https://cdn.slidesharecdn.com/ss_thumbnails/andsec-r3mf-160602032329-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/andsec-reversing-on-macho-file/62641318 Andsec Reversing on Ma...