Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Yara Toolkit
Search
Sponsored
·
SiteGround - Reliable hosting with speed, security, and support you can count on.
→
Thomas Roccia
December 16, 2024
Programming
0
270
Yara Toolkit
This talk was presented at Hack Sydney and Bsides Gold Coast.
Thomas Roccia
December 16, 2024
Tweet
Share
More Decks by Thomas Roccia
See All by Thomas Roccia
Where is My Crypto Dude!
fr0gger
0
26
Generative AI Breaches: Threats, Investigations, and Response
fr0gger
0
880
The XZ Backdoor Story
fr0gger
0
4.8k
Prompt Engineering for Threat Intelligence
fr0gger
1
770
State-Sponsored Financially Motivated Attacks
fr0gger
0
750
Binary Instrumentation for Malware Analysis
fr0gger
2
1.7k
Conti Leaks: Practical walkthrough and what can we learn from it
fr0gger
0
1.1k
Sharing is Caring: Sharing Threat Intelligence Notebook Edition
fr0gger
0
2.1k
Code Graphology
fr0gger
0
900
Other Decks in Programming
See All in Programming
組織で育むオブザーバビリティ
ryota_hnk
0
170
生成AIを使ったコードレビューで定性的に品質カバー
chiilog
1
260
なるべく楽してバックエンドに型をつけたい!(楽とは言ってない)
hibiki_cube
0
140
OCaml 5でモダンな並列プログラミングを Enjoyしよう!
haochenx
0
140
AIで開発はどれくらい加速したのか?AIエージェントによるコード生成を、現場の評価と研究開発の評価の両面からdeep diveしてみる
daisuketakeda
1
2.4k
コマンドとリード間の連携に対する脅威分析フレームワーク
pandayumi
1
450
KIKI_MBSD Cybersecurity Challenges 2025
ikema
0
1.3k
MDN Web Docs に日本語翻訳でコントリビュート
ohmori_yusuke
0
640
15年続くIoTサービスのSREエンジニアが挑む分散トレーシング導入
melonps
2
190
CSC307 Lecture 04
javiergs
PRO
0
660
それ、本当に安全? ファイルアップロードで見落としがちなセキュリティリスクと対策
penpeen
7
3.8k
責任感のあるCloudWatchアラームを設計しよう
akihisaikeda
3
170
Featured
See All Featured
End of SEO as We Know It (SMX Advanced Version)
ipullrank
3
3.9k
How to build a perfect <img>
jonoalderson
1
4.9k
Building AI with AI
inesmontani
PRO
1
690
The SEO Collaboration Effect
kristinabergwall1
0
350
Building Applications with DynamoDB
mza
96
6.9k
Amusing Abliteration
ianozsvald
0
97
The SEO identity crisis: Don't let AI make you average
varn
0
67
Fireside Chat
paigeccino
41
3.8k
SEO for Brand Visibility & Recognition
aleyda
0
4.2k
Agile Leadership in an Agile Organization
kimpetersen
PRO
0
79
Public Speaking Without Barfing On Your Shoes - THAT 2023
reverentgeek
1
300
The Director’s Chair: Orchestrating AI for Truly Effective Learning
tmiket
1
96
Transcript
YARA TOOLKIT
None
DEMO DEMO
👀
Analysis similar binaries Identify unique patterns strings, code... Build the
rule with your findings Test on a cleaned dataset Deploy to the service of choice Monitor everything
Import Module pe, elf, hash, math, cuckoo, dotnet, time Rule
Name Global rules, Private rules, Rule tags Metadata Author, Date, Description, Etc… Strings Text strings, Hexadecimal string, Regex Text Strings nocase, wide, fullword, xor(0x01-0xff), base64 Hexadecimal Wild-cards: { 00 ?2 A? }, Jump: { 3B [2-4] B4 }Alternatives: { F4 (B4 | 56) } REGEX Conditions Boolean operators, Arithmetic operators, Bitwise operators, Counting strings, Strings, offset https://blog.securitybreak.io/security-infographics-9c4d3bd891ef#18dd
memset(key, fillValue, sizeof(key)); memset(permutedArray, fillValue_1, sizeof(permutedArray)); for ( i =
0i64; i != 256; ++i ) { permutedArray[i] = i; key[i] = RC4key[(int)i % 12]; // '3jB(2bsG#@c7' } index1 = 0i64; index2 = 0; do { currentValue = permutedArray[index1]; index2 += key[index1] + currentValue; swapValue = permutedArray[index2]; permutedArray[index2] = currentValue; permutedArray[index1++] = swapValue; }
CVE-2021-1732 was a Local Privilege Escalation (LPE) exploit on Windows
10, exploited in the wild by the Bitter APT.
None
None
None
None
None
None
None
Yara Documentation, Useful resources. Knowledge Base Embedding Retriever Putting the
data in a multi dimensional vector Retrieve information from the database based on similarity RAG DocYara Help you understand how to use Yara Help you create your rule Help you refine your rule 👨⚕️ Retrieval Augmented Generation
None
None
None