HTTP Header Hunting - A Behavioral Approach to Malware Detection

SOURCE Boston 2013

Presented by: Jonathan Claudius, Ben Jackson, Rodrigo Montoro (Sp0oKeR)
Date: Thursday April 18, 2013
Time: 14:30 - 15:20
Location: Shubert

A large percentage of malware today uses HTTP/HTTPS as it’s call back mechanism. These call back mechanisms are used for anything from command and control, deploying new malware payloads, exfiltrating sensitive data and a variety of other malicous activities. It’s become increasingly difficult detect this malware as thousands of new samples appear daily as this threat continues to evolve.

Jonathan Claudius

Jonathan is a Security Researcher at Trustwave, and a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. Jonathan has ten years of experience in the IT industry and works in SpiderLabs where he focuses on vulnerability scanning signature development, network exploitation and is the creator of the BNAT-Suite. Rodrigo has 13 years experience deploying open source security software (firewalls, IDS, IPS, HIDS, log management) and hardening systems.

Rodrigo Montoro

Rodrigo is a Security Researcher at Trustwave, and a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He focuses on IDS/IPS Signatures and new malware detection researches( PDFScore and HTTP Header Research).


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats