Shared January 24, 2019
Going viral hasn't always been considered good. Whether you're fighting the common cold, or trying to remove the ILOVEYOU computer worm from your corporate file server, two things are certain: your immune system is based on your gut health, and computers have really poor gut health.
Stopping viruses is hard. The main reason for this is that viruses are really clever. They've evolved over time to escape detection. Each previously detected virus allows the next iteration of the virus to become more resilient. The second reason is that your computer's gut health has to fight every virus, whereas each virus just has to find one immuno-compromised system to survive.
Let's work out how viruses hide. How to they sneak past the checkpoints. How they attach themselves to your system. How they fight detection, and removal. We'll look at aspects such as self-replication, cryptographic obfuscation, and touch on methods of delivery and infection.
Now that you're thinking like a virus writer, you can anticipate which areas of your applications need hardening. Just remember, we're doing it for good, not profit :)
This presentation will feature live demos of writing PHP viruses, and infection of willing targets. The theories apply equally to many languages, so an understanding of PHP is not required.
linux.conf.au is a conference about the Linux operating system, and all aspects of the thriving ecosystem of Free and Open Source Software that has grown up around it. Run since 1999, in a different Australian or New Zealand city each year, by a team of local volunteers, LCA invites more than 500 people to learn from the people who shape the future of Open Source. For more information on the conference see https://linux.conf.au/
#linux.conf.au #linux #foss #opensource
DebConf 14: QA with Linus Torvalds
World's Most Famous Hacker Kevin Mitnick & KnowBe4's Stu Sjouwerman Opening Keynote
Destroying a VM With a Spooky Malware! (Virus Investigations 36)
All of our data is GONE!
Running an SQL Injection Attack - Computerphile
Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra
I'll Let Myself In: Tactics of Physical Pen Testers
How To Think Like A Programmer
Tutorial: Building the Simplest Possible Linux System - Rob Landley, se-instruments.com
Here's What Happens When an 18 Year Old Buys a Mainframe
The Tragedy of systemd
Preventing the IoT Dystopia with Copyleft
Kernel Security Is Cool Again
The mind behind Linux | Linus Torvalds
Database as Filesystem
Buffer Overflow Attack - Computerphile
Google Coding Interview With A Competitive Programmer