Raeraeversing.hashnode.dev·Jul 12, 2024Malware Analysis Ransomware Script — BTLO Writeup.Olá pessoal! Hoje trago mais um write-up de uma CTF Free do Blue Team Labs Online. Dessa vez completei o laboratório Malware Analysis Ransomware Script, um laboratório de nível Fácil, onde analisaremos o Script de um Ransomware. Vamos lá! 1 — What is...Discussmalware analysis
aisha javedcyberurdu.hashnode.dev·Jun 25, 2024Cybersecurity Level 2 - Hacking within Lab"سائبر سیکیورٹی کے ماہر بنیں اور جدید خطرات کے خلاف ہینڈ آن لیبز کے ساتھ دفاع کریں، بشمول کلائنٹ سائیڈ کے غلط استعمال اور سوشل انجینئرنگ کے حملے۔" کورس کا عنوان: سائبرسیکیوریٹی لیول 2 - لیب کے اندر ہیکنگ اس مضمون میں میں آپ کو بتاؤں گا کہ سائبرسیکیور...DiscussIntermediate Cybersecurity
Reza RashidiforRedTeamReciperedteamrecipe.com·May 30, 2024Assembly for Hackers"Assembly Unleashed: A Hacker's Handbook" is a definitive resource tailored specifically for hackers and security researchers seeking to master the art of assembly programming language. Authored by seasoned practitioners in the field, this book offer...Discuss·8 likes·8.0K readsAssembly
Maik Romaikroservice.com·Mar 4, 2024Malware Analysis I - Detecting Indicators of Compromise and malicious InfrastructureToday we will see how we can identify malware urls / indicators of compromise from malware and the malware sample we will use is: https://bazaar.abuse.ch/sample/41f76926477c7f8759900567ced4e5e1f9057e40d2a151badc873d23f372997e/ Stage 1 - comprobante_s...Discuss·245 readshacking
Mohamed Kouroumamokourouma.hashnode.dev·Feb 16, 2024Analysing the Gootloader infection Palo-Alto threat intelligence using wireshark and performing dynamic analysissource: https://www.malware-traffic-analysis.net/2024/01/08/index.html In this analysis I will start with investigating the packet with wireshark and perform code analysis. Using some filters to make analysis much easier and efficient, individual pa...Discussmalware analysis
Damon Vesseydamonvessey.com·Feb 10, 2024Where Do I Even Begin to Learn Reverse Engineering?That's the million dollar question. My personal opinion, learning the C programming language would be an excellent place to start. There will be others that argue to learn python, but once you get into reverse engineering, you'll have to learn C anyw...Discuss·34 readsFrom Beginner to Smashing the Stack for Fun and Profit and Beyondreverse engineering
Aljoscha Irmeraljoschairmer.hashnode.dev·Jan 16, 2024Deciphering the Hidden: The Role of AI in Unmasking Obfuscated MalwareIntroduction In the evolving landscape of cybersecurity, the threat of malware and viruses persists as a significant challenge. These malicious entities often employ obfuscated code - a method designed to mask their true purpose and make analysis dif...DiscussObfuscated Code
Gunjan Mehtagunjanmehta01.hashnode.dev·Dec 13, 2023Day 9 of Advent of Cyber 2023!Back story: Forensic McBlue and his team found the deleted version of a malware that lets Tracy McGreedy control elves from a distance. Now, they're working to stop this mind control incident. Their plan is to get back at Tracy by examining the back-...Discussmalware analysis
Bishwajeet Biswasblog.ethernyte.com·Dec 1, 2023Unraveling the Intricacies of C# DLL Injection Malware: A Deep Dive into Malicious CodeIn the world of cybersecurity, every day is a battle against an evolving army of digital adversaries. Today, we're going to explore the thrilling, mysterious realm of C# DLL Malware. This journey will involve analyzing file hashes, decoding the secre...Discuss·129 reads#cybersecurity
Bishwajeet Biswasblog.ethernyte.com·Nov 24, 2023Excel Macros Unleashed: The Hidden Malware ThreatIn the realm of cybersecurity, the unassuming Excel spreadsheet has become a battleground for cybercriminals. Excel macro malware, the silent saboteurs, lurk within seemingly harmless files, waiting to strike. Let's embark on a quest to decode their ...Discuss·109 reads#cybersecurity