Esther Adwetsessadwets.hashnode.dev·Nov 15, 2024Static vs. Dynamic Analysis of Artifacts: Key Differences, Scenarios, and ExamplesIn digital forensics, an artifact is any evidence or data uncovered during an investigation. Artifacts include, but are not limited to, sync and file management metadata, cached files, data from cloud services, authentication details, encryption info...Discussmalware analysis
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 15, 2024Day 16: Know the Enemy Before It Strikes"Remember when your friend 'accidentally' downloaded a mysterious file from a website that promised free Netflix for life? Well, turns out they didn't get free Netflix... but their device got an all-expenses-paid trip to Malware-ville." We've all he...DiscussCybersecurity Awareness 2024: Securing Our Worldvirus prevention
TATHAGATA ROYthreatradar.vercel.app·Sep 20, 2024Malware Analysis of Zeus Banking TrojanThe Zeus Banking Trojan has been one of the most persistent and dangerous pieces of malware to target financial institutions and end-user systems. This technical blog walks through a complete malware analysis of the Zeus Trojan using a secure, isolat...Discuss·123 readsSecurity
Dru BanksProbluecordsecurity.io·Aug 8, 2024Malware Analysis: Compiled Python ExecutablesThis article explains the process of decompiling malicious Python executables using tools like Pyinstxractor-ng and Decompyle++. It covers the various stages of the Pyinstaller compilation process, from analysis and collection to bytecode compilation...Discuss·116 readsMalware
Keqingsmellgoodkeqingsmellgood.hashnode.dev·Jul 30, 2024[SEC Playground: Half Year CTF 2024] - Meaware 1-5Introduction to Challenge The challenge was a Meaware.zip archive. Inside, it contained a happymeow.exe binary. The goal to achieve the flag was to thoroughly analyze the provided malware sample. The malware itself has detection evasion logic. It wil...Discuss·104 readsSEC Playground: Half Year CTF 2024CTF Writeup
aisha javedcyberurdu.hashnode.dev·Jun 25, 2024Cybersecurity Level 2 - Hacking within Lab"سائبر سیکیورٹی کے ماہر بنیں اور جدید خطرات کے خلاف ہینڈ آن لیبز کے ساتھ دفاع کریں، بشمول کلائنٹ سائیڈ کے غلط استعمال اور سوشل انجینئرنگ کے حملے۔" کورس کا عنوان: سائبرسیکیوریٹی لیول 2 - لیب کے اندر ہیکنگ اس مضمون میں میں آپ کو بتاؤں گا کہ سائبرسیکیور...DiscussIntermediate Cybersecurity
Reza RashidiforRedTeamReciperedteamrecipe.com·May 30, 2024Assembly for Hackers"Assembly Unleashed: A Hacker's Handbook" is a definitive resource tailored specifically for hackers and security researchers seeking to master the art of assembly programming language. Authored by seasoned practitioners in the field, this book offer...Discuss·9 likes·10.5K readsAssembly
Maik Romaikroservice.com·Mar 4, 2024Malware Analysis I - Detecting Indicators of Compromise and malicious InfrastructureToday we will see how we can identify malware urls / indicators of compromise from malware and the malware sample we will use is: https://bazaar.abuse.ch/sample/41f76926477c7f8759900567ced4e5e1f9057e40d2a151badc873d23f372997e/ Stage 1 - comprobante_s...Discuss·358 readshacking
Mohamed Kouroumamokourouma.hashnode.dev·Feb 16, 2024Analysing the Gootloader infection Palo-Alto threat intelligence using wireshark and performing dynamic analysissource: https://www.malware-traffic-analysis.net/2024/01/08/index.html In this analysis I will start with investigating the packet with wireshark and perform code analysis. Using some filters to make analysis much easier and efficient, individual pa...Discussmalware analysis
Damon Vesseydamonvessey.com·Feb 10, 2024Where Do I Even Begin to Learn Reverse Engineering?That's the million dollar question. My personal opinion, learning the C programming language would be an excellent place to start. There will be others that argue to learn python, but once you get into reverse engineering, you'll have to learn C anyw...Discuss·40 readsFrom Beginner to Smashing the Stack for Fun and Profit and Beyondreverse engineering