Filipi Pires

Filipi Pires

Principal Security Engineer and Researcher at Zup Innovation

Bio

I've been working Researcher and Research Security Manager in ZUP Security Labs at Zup Innovation and Global Research Manager at Hacker Security, I have talked in Security events in US, Argentina, Germany, Poland, Hungary, Czech Republic, Brazil and others countries, served as University Professor in Undergraduate / MBA courses at colleges as FIAP / Mackenzie / UNIBTA and UNICIV, in addition, I'm Founder and Instructor of the Course - Malware Analysis - Fundamentals (HackerSec Company - Online Course - Portuguese Language).

Malware manipulated in Cloud Environment, is Dangerous?

During this presentation, I'll show how the effects can bring in inside the Cloud environment if was exploitable by Malware using PDF file, explaining how each session works within a file, what are the techniques used such as packers, obfuscation and more..

Demonstrate differents kind of structures in the binaries as a PE (header and your sessions) , ELF (header and your sessions), PDF(header/ body/cross-reference table/trailer), explaining how each session works within a binary, what are the techniques used such as packers, obfuscation with JavaScript (PDF) and more, explaning too about some anti-desassembly techniques, demonstrating as a is the action of these malwares and where it would be possible to ""include"" a malicious code.

During this presentation, I'll show how the effects can brind in inside the Cloud environment if was exploitable by Malware.

By the end of this ""talk"" it will be clear to everyone, differences in binaries structures, how can the researcher should conduct each of these kind of analyzes, besides of course, it should seek more basic knowledge, with file structures, software architecture and programming language."



Agenda Talks

Cybersecurity Week

14:50 to 15:20
24 Nov 2020

Malware manipulated in Cloud Environment, is Dangerous?

During this presentation, I'll show how the effects can bring in inside the Cloud environment if was exploitable by Malware using PDF file, explaining how each session works within a file, what are the techniques used such as packers, obfuscation and more..

  • Filipi Pires Avatar Filipi Pires Principal Security Engineer and Researcher at Zup Innovation