Aboelhamd Abdellatifaboelhmd.com·Dec 11, 2024The Rise of Fileless Cyber Attacks: What You Need to KnowIn the ever-evolving world of cybersecurity, one type of attack has gained notoriety for its ability to evade traditional defenses: fileless attacks. These stealthy incursions have shifted the paradigm of cyber threats by exploiting legitimate tools ...#FilelessAttacks
Esther Adwetsessadwets.hashnode.dev·Nov 15, 2024Static vs. Dynamic Analysis of Artifacts: Key Differences, Scenarios, and ExamplesIn digital forensics, an artifact is any evidence or data uncovered during an investigation. Artifacts include, but are not limited to, sync and file management metadata, cached files, data from cloud services, authentication details, encryption info...malware analysis
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 15, 2024Day 16: Know the Enemy Before It Strikes"Remember when your friend 'accidentally' downloaded a mysterious file from a website that promised free Netflix for life? Well, turns out they didn't get free Netflix... but their device got an all-expenses-paid trip to Malware-ville." We've all he...Cybersecurity Awareness 2024: Securing Our Worldvirus prevention
TATHAGATA ROYthreatradar.vercel.app·Sep 20, 2024Malware Analysis of Zeus Banking TrojanThe Zeus Banking Trojan has been one of the most persistent and dangerous pieces of malware to target financial institutions and end-user systems. This technical blog walks through a complete malware analysis of the Zeus Trojan using a secure, isolat...174 readsSecurity
Dru Banksbluecordsecurity.io·Aug 8, 2024Malware Analysis: Compiled Python ExecutablesThis article explains the process of decompiling malicious Python executables using tools like Pyinstxractor-ng and Decompyle++. It covers the various stages of the Pyinstaller compilation process, from analysis and collection to bytecode compilation...135 readsMalware
Keqingsmellgoodkeqingsmellgood.hashnode.dev·Jul 30, 2024[SEC Playground: Half Year CTF 2024] - Meaware 1-5Introduction to Challenge The challenge was a Meaware.zip archive. Inside, it contained a happymeow.exe binary. The goal to achieve the flag was to thoroughly analyze the provided malware sample. The malware itself has detection evasion logic. It wil...104 readsSEC Playground: Half Year CTF 2024CTF Writeup
aisha javedcyberurdu.hashnode.dev·Jun 25, 2024Cybersecurity Level 2 - Hacking within Lab"سائبر سیکیورٹی کے ماہر بنیں اور جدید خطرات کے خلاف ہینڈ آن لیبز کے ساتھ دفاع کریں، بشمول کلائنٹ سائیڈ کے غلط استعمال اور سوشل انجینئرنگ کے حملے۔" کورس کا عنوان: سائبرسیکیوریٹی لیول 2 - لیب کے اندر ہیکنگ اس مضمون میں میں آپ کو بتاؤں گا کہ سائبرسیکیور...Intermediate Cybersecurity
Reza Rashidiblog.redteamguides.com·May 30, 2024Assembly for Hackers"Assembly Unleashed: A Hacker's Handbook" is a definitive resource tailored specifically for hackers and security researchers seeking to master the art of assembly programming language. Authored by seasoned practitioners in the field, this book offer...10 likes·10.8K readsAssembly
Maik Romaikroservice.com·Mar 4, 2024Malware Analysis I - Detecting Indicators of Compromise and malicious InfrastructureToday we will see how we can identify malware urls / indicators of compromise from malware and the malware sample we will use is: https://bazaar.abuse.ch/sample/41f76926477c7f8759900567ced4e5e1f9057e40d2a151badc873d23f372997e/ Stage 1 - comprobante_s...376 readshacking
Mohamed Kouroumamokourouma.hashnode.dev·Feb 16, 2024Analysing the Gootloader infection Palo-Alto threat intelligence using wireshark and performing dynamic analysissource: https://www.malware-traffic-analysis.net/2024/01/08/index.html In this analysis I will start with investigating the packet with wireshark and perform code analysis. Using some filters to make analysis much easier and efficient, individual pa...malware analysis