cxnrvd.hashnode.devTechnical Blog: Dissecting Mallox Ransomware Deployment via MS-SQL Exploitation and CryptominingSummary Mallox ransomware operators exploit vulnerabilities in MS-SQL and ODBC interfaces to gain initial access. The threat actors deploy malicious batch scripts to execute ransomware and XMRig cryptominers. Advanced fileless execution techniques...Jan 2, 2025·4 min read
cxnrvd.hashnode.devDay 8: ShellCodeA Hacker’s Lesson: Writing Shellcode and Creating a Reverse Shell Glitch, a skilled but mistrusted hacker, was prepping for a tech conference. He was eager to share his shellcode script that remotely accessed his home system. As he worked, he noticed...Dec 24, 2024·3 min read
cxnrvd.hashnode.devDay 7: AWS Log Analysis WalkthroughDay 7's challenge focuses on AWS log analysis, providing hands-on experience in identifying anomalous activities within cloud environments. We dived into the investigation of AWS logs using CloudWatch, CloudTrail, and JQ—three powerful tools that are...Dec 22, 2024·4 min read
cxnrvd.hashnode.devDay 6: SandboxesLearning Objectives Today, we’ll learn how to: Analyze malware behavior using sandbox tools Explore how to use YARA rules to detect malicious patterns Understand various malware evasion techniques Implement an evasion technique to bypass YARA rul...Dec 22, 2024·4 min read
cxnrvd.hashnode.devDay 5: Exploring XML External Entity (XXE) Vulnerabilities in Web ApplicationsIn today's blog post, we’ll dive into a critical vulnerability that was overlooked—the XML External Entity (XXE) vulnerability—and explore how we can exploit it to assess the security of the application. Let’s walk through what this vulnerability is,...Dec 22, 2024·4 min read