License to Kill: Malware Hunting with the Sysinternals Tools

  Рет қаралды 71,124

Mark Russinovich

Mark Russinovich

3 жыл бұрын

This session provides an overview of several Sysinternals tools, including Process Monitor, Process Explorer, and Autoruns, focusing on the features useful for malware analysis and removal. These utilities enable deep inspection and control of processes, file system and registry activity, and autostart execution points. You will see demos for their malware-hunting capabilities through several real-world cases that used the tools to identify and clean malware, and conclude by performing a live analysis of a Stuxnet infection’s system impact.
Filmed at TechEd 2013

Пікірлер: 49
@Comm0ut
@Comm0ut 2 жыл бұрын
agvulpine nailed it and I quote because this would be a major tedium-avoider! : "Want to help us terminate malware processes? Allow us to select multiple processes in Process Explorer, and terminate all of them with one single Delete key press. Currently we have to manually terminate dozens of processes one-by-one, and often times they're multiple processes working in tandem."
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 3 жыл бұрын
I like your tools and love this talk. I have re-watched it a few times. I know the talk is very old. I still would like to point out that the study conducted by Google did not permit internet access for the AV scanners used in the test, which of course plummets the detection rate a lot, not only from the missing cloud features but also because lots of malware relies on Internet to show malicious behaviour. Extracting from that the general statement that AVs detect only 40% of malware is quite a stretch.
@kreassiva9138
@kreassiva9138 2 жыл бұрын
<a href="#" class="seekto" data-time="610">10:10</a> as a person with autism I can say this is one of the most satisfying things I have ever seen on KZfaq. Definitely the kind of things I usually do but I have never seen anyone else do until now.
@noviccen388
@noviccen388 25 күн бұрын
whats it got to do with autismm ?
@agvulpine
@agvulpine 3 жыл бұрын
Want to help us terminate malware processes? Allow us to select multiple processes in Process Explorer, and terminate all of them with one single Delete key press. Currently we have to manually terminate dozens of processes one-by-one, and often times they're multiple processes working in tandem.
@aaronvaldes3104
@aaronvaldes3104 Жыл бұрын
<a href="#" class="seekto" data-time="2">0:02</a>:00 About this Talk <a href="#" class="seekto" data-time="2">0:02</a>:46 Sysinternals Antivirus - Don't use it!!!! <a href="#" class="seekto" data-time="3">0:03</a>:25 Malware Cleaning Steps <a href="#" class="seekto" data-time="7">0:07</a>:20 What are you looking for? <a href="#" class="seekto" data-time="8">0:08</a>:53 What About Task Manager? <a href="#" class="seekto" data-time="9">0:09</a>:14 Process Explorer <a href="#" class="seekto" data-time="9">0:09</a>:59 sysinternals tools <a href="#" class="seekto" data-time="10">0:10</a>:45 Process Explorer - Process View <a href="#" class="seekto" data-time="13">0:13</a>:23 Process Explorer - Refresh Highlighting <a href="#" class="seekto" data-time="14">0:14</a>:21 Process Explorer - Tooltips <a href="#" class="seekto" data-time="15">0:15</a>:13 Process Explorer - New Features <a href="#" class="seekto" data-time="15">0:15</a>:43 Process Explorer - Detailed Process Information <a href="#" class="seekto" data-time="17">0:17</a>:14 Image Verification <a href="#" class="seekto" data-time="19">0:19</a>:07 Sigcheck and ListDlls <a href="#" class="seekto" data-time="20">0:20</a>:27 Process Explorer - Strings <a href="#" class="seekto" data-time="21">0:21</a>:17 Process Explorer - The DLL View <a href="#" class="seekto" data-time="21">0:21</a>:45 listdlls <a href="#" class="seekto" data-time="22">0:22</a>:05 Terminating Malicious Processes <a href="#" class="seekto" data-time="23">0:23</a>:44 Cleaning Autostarts <a href="#" class="seekto" data-time="24">0:24</a>:03 msconfig in Windows 8 <a href="#" class="seekto" data-time="24">0:24</a>:31 Autoruns <a href="#" class="seekto" data-time="27">0:27</a>:09 Autroruns - Alternate Profiles and Offline Scanning <a href="#" class="seekto" data-time="27">0:27</a>:46 Autroruns - New Features <a href="#" class="seekto" data-time="28">0:28</a>:08 Autrorunsc <a href="#" class="seekto" data-time="28">0:28</a>:38 Deleting Autostarts <a href="#" class="seekto" data-time="28">0:28</a>:55 Tracing Malware Activity - Process Monitor <a href="#" class="seekto" data-time="30">0:30</a>:20 Process Monitor - Filtering <a href="#" class="seekto" data-time="31">0:31</a>:07 Process Monitor - category is write <a href="#" class="seekto" data-time="31">0:31</a>:43 Process Monitor - The Process Tree <a href="#" class="seekto" data-time="32">0:32</a>:19 Real World Analysis and Cleaning <a href="#" class="seekto" data-time="32">0:32</a>:35 Cleaning Winwebsec Scareware <a href="#" class="seekto" data-time="41">0:41</a>:13 The Case of the Fake Antivirus <a href="#" class="seekto" data-time="42">0:42</a>:55 scarewarez <a href="#" class="seekto" data-time="42">0:42</a>:55 Analyzing and Lockscreen.CT <a href="#" class="seekto" data-time="44">0:44</a>:45 lockscreen.ct <a href="#" class="seekto" data-time="46">0:46</a>:45 SAFE MODE with no Shell!!!! <a href="#" class="seekto" data-time="48">0:48</a>:01 The Case of the Runaway GPU <a href="#" class="seekto" data-time="50">0:50</a>:51 bitcoin miner malware - Vicenor <a href="#" class="seekto" data-time="53">0:53</a>:54 The Case of the Unexplained FTP Connections <a href="#" class="seekto" data-time="64">1:04</a>:58 Conclusion - Analyzing and Cleaning Flame <a href="#" class="seekto" data-time="66">1:06</a>:13 Stuxnet <a href="#" class="seekto" data-time="69">1:09</a>:47 Flame <a href="#" class="seekto" data-time="73">1:13</a>:50 Summary - The Future of Malware <a href="#" class="seekto" data-time="75">1:15</a>:20 Trojan Horse - A Novel
@kenmosburg2445
@kenmosburg2445 Жыл бұрын
Aaron Valdes! You and Mark are AWESOME HERO's to humanity, you do valuable things to help others, I admire and appreciate you Hero's, for not being as selfish as we humans often become~!
@JoaoLucasMacedo
@JoaoLucasMacedo 3 жыл бұрын
I'm a big fan of your work Mark. Now even more I saw you also like DaftPunk.
@sebastianfernandezmora5796
@sebastianfernandezmora5796 2 жыл бұрын
that part was hilarious
@rev.kenshostad2888
@rev.kenshostad2888 3 ай бұрын
This was made when Windows 7 was a thing... It would be nice to have an update, with newer tools...
@duncanochieng2462
@duncanochieng2462 Ай бұрын
Woooooow! Just 2 minutes in and I already like the guy.. where have you been all my life😂
@rev.kenshostad2888
@rev.kenshostad2888 Ай бұрын
Yeah, 2 min. in and I'm going to switch to Linux...
@Siik94Skillz
@Siik94Skillz Жыл бұрын
Great great talk! loved it!
@0Sejo0
@0Sejo0 3 жыл бұрын
Who's here from the TryHackMe Sysinternals room? Awesome conference by the way!
@yaserbasaad7984
@yaserbasaad7984 2 жыл бұрын
Mr Mark , Is there any book or site give more practical to use the tools.
@michalialambeis4466
@michalialambeis4466 2 жыл бұрын
Thank you very much. Really helpfull upload.
@PassionataDance
@PassionataDance 3 жыл бұрын
Can you make a webshell hunting tool forensic compromise seeking tool.
@tigger2581
@tigger2581 2 жыл бұрын
wow this guys good
@user-wh2vy8nf3x
@user-wh2vy8nf3x 2 ай бұрын
Great presentation
@immersivebeats
@immersivebeats 2 ай бұрын
Yeah no I are the man aren't you...u just know it all ...well done brother...u carry on sitting there ending processes
@mdd1963
@mdd1963 3 жыл бұрын
Is not this exact recorded lecture about 5-7 years old now?
@janisemulis1604
@janisemulis1604 3 жыл бұрын
It's from 2013
@mitraconsultan473
@mitraconsultan473 2 жыл бұрын
How to cloning Aplikasi in explorer..?? pleasee...
@user-nh6fq6lb7v
@user-nh6fq6lb7v 18 күн бұрын
Oh my old friend bitcoin if i knew what I know now.
@lisaallen7891
@lisaallen7891 3 жыл бұрын
What do you think about McAfee? I have LOTS of things to say about it, but nothing nice, since IT'S malware TOO~
@user-jk3dm5uu2m
@user-jk3dm5uu2m 2 жыл бұрын
没有字幕
@c-LAW
@c-LAW 3 жыл бұрын
<a href="#" class="seekto" data-time="110">1:50</a> "Show me your browser history" 99.9% of people using Windows don't know or understand the overwhelming amount of telemetry flowing from their computers to Microsoft, including browser and search history.
@RaihanAlam
@RaihanAlam 2 жыл бұрын
more like 99.99% of people using any form of computer or smart phone
@user-lm2hb7dn7t
@user-lm2hb7dn7t 3 ай бұрын
Awesome!
@windome4rle
@windome4rle 3 жыл бұрын
Polo Ralph Lauren internals
@v4ltonn
@v4ltonn Ай бұрын
There was an time that malware was signed with Microsoft CERT!
@urielpelaezcdmx
@urielpelaezcdmx Ай бұрын
⭐⭐
@safetime100
@safetime100 7 ай бұрын
Legend ❤
@AvidDigital.m
@AvidDigital.m 5 ай бұрын
It's from 2013 - 10 yrs late | I wanted somthiing from 2023
@andis2595
@andis2595 4 ай бұрын
why is this 3 year old video from 2013 😭
@immersivebeats
@immersivebeats 2 ай бұрын
its not in cyber you able to modify the date as well
@GabiGris
@GabiGris 2 ай бұрын
data redundancy makes the wiping easier, in particular in enterprise envioments, not for the rest of us mortals storing an epic Ultima VII saved stage for years now🥴😅
@immersivebeats
@immersivebeats 2 ай бұрын
Where's all Ur processors now lol😅😂? Mr know it all
@israelgarcia7801
@israelgarcia7801 3 ай бұрын
Wow
@immersivebeats
@immersivebeats 2 ай бұрын
Next time worry about Ur own life..dnt look so deep into mine...maybe we should start calling u 007
@tbremard
@tbremard 2 жыл бұрын
I was in trouble..... And... I.. Used... Process Monitor! And her is the Post-mortem : kzfaq.info/get/bejne/m7x1aLh9ravdqqM.html
@immersivebeats
@immersivebeats 2 ай бұрын
Scareware????is that what u call urself..lol license to kill I don't think so
@immersivebeats
@immersivebeats 2 ай бұрын
busy busy busy
@tubeDude48
@tubeDude48 2 ай бұрын
Run RKILL and TRON rather then this crap! They automate every step and DON'T require intervention!! Another way for Microshaft to make money! 👎
@kreassiva9138
@kreassiva9138 2 жыл бұрын
<a href="#" class="seekto" data-time="610">10:10</a> as a person with autism I can say this is one of the most satisfying things I have ever seen on KZfaq. Definitely the kind of things I usually do but I have never seen anyone else do until now.
Malware Analysis Part 1
2:00:44
Information Security Club UCalgary
Рет қаралды 21 М.
Malware Hunting with Mark Russinovich and the Sysinternals Tools
1:26:37
Mark Russinovich
Рет қаралды 61 М.
Эффект Карбонаро и бесконечное пиво
01:00
История одного вокалиста
Рет қаралды 6 МЛН
1 класс vs 11 класс  (игрушка)
00:30
БЕРТ
Рет қаралды 2,6 МЛН
Каха инструкция по шашлыку
01:00
К-Media
Рет қаралды 7 МЛН
В ДЕТСТВЕ СТРОИШЬ ДОМ ПОД СТОЛОМ
00:17
SIDELNIKOVVV
Рет қаралды 3,4 МЛН
Analyzing the Zeus Banking Trojan - Malware Analysis Project 101
1:41:16
Defrag Tools - Chat with Mark Russinovich at TechEd 2014
25:39
Mark Russinovich
Рет қаралды 541
Pass-the-Hash: How Attackers Spread and How to Stop Them
1:12:27
Mark Russinovich
Рет қаралды 20 М.
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,5 МЛН
The LAST flash drive you will ever need! Ventoy FULL walk-thru and review!
14:50
Ask Your Computer Guy
Рет қаралды 658 М.
The Case of the Unexplained 2007: Troubleshooting with Mark Russinovich
1:14:34
cool watercooled mobile phone radiator #tech #cooler #ytfeed
0:14
Stark Edition
Рет қаралды 8 МЛН
WWDC 2024 Recap: Is Apple Intelligence Legit?
18:23
Marques Brownlee
Рет қаралды 307 М.