Sep 14Understanding Antivirus SignaturesSignatures are a key part of any antivirus engine. The signatures are typically hashes or byte-streams that are used to determine whether a file or buffer contains a malicious payload. All antivirus engines, since their inception, have used a signature scheme. Although various kinds exist, the signatures are typically small…Antivirus14 min readAntivirus14 min read
Sep 3Red Teaming — Part 02External Reconnaissance If your engagement is not being kicked off via an “assume breach” methodology and you need to gain initial entry into the target network yourselves, some external reconnaissance will be required. …Red Team4 min readRed Team4 min read
Aug 12Malware Analysis Series (MAS): Part 3Code Injection Review Code injection is a supported operation on Window systems and, of course, it a quite useful evasion method due to the fact that a malware is able to inject (write) a malicious code into a memory region (some people use the term “segment”) of the process itself (self-injection) or a…Malware Analysis11 min readMalware Analysis11 min read
Aug 5Red Teaming — Part 01What is Red Teaming? Red Teaming is the process of using tactics, techniques and procedures (TTPs) to emulate a real-world threat, with the goal of measuring the effectiveness of the people, processes and technologies used to defend an environment. Red teams provide an adversarial perspective by attacking assumptions made by an organization and defenders…Red Teaming9 min readRed Teaming9 min read
Feb 14Malware Analysis Series (MAS): Part 2Malware analysis goals No doubts, It’s an interesting point: what are we looking for while analyzing a binary? The question is relevant because there’re many possible objectives and aspects to be regarded while analyzing a malware. …Malware Analysis12 min readMalware Analysis12 min read
Feb 13Ethical Hacking vs Penetration Testing: A Comprehensive GuideIn today’s digital world, cybersecurity is a critical concern for organizations of all sizes. The rise of technology has led to an increased dependence on computer systems, networks, and web applications, making it crucial for organizations to assess and improve their security posture. …Cyber3 min readCyber3 min read
Jan 11Malware Analysis Series (MAS): Part 1Introduction Welcome to MAS (Malware Analysis Series). Quite frankly, it was quite difficult to stop my research work to write an article in the last year and it would not be possible to write a series of articles, but I think it is possible now and we will try it. …Malware Analysis3 min readMalware Analysis3 min read
Dec 17, 2022Cybercrime and its existing lawsCybercrime is defined as any criminal activity involving the use of computers, networks, or the internet. It can include any number of activities, such as identity theft, fraud, copyright infringement, hacking, and cyber bullying. …Cybercrime4 min readCybercrime4 min read
Dec 17, 2022Encrypt all the files in a specified directory in WindowsHere is a Python script that you can use to encrypt all the files in a specified directory in Windows: import os import pyAesCrypt # Set the directory that you want to encrypt directory = "C:\\example\\" # Set the password for the encryption password = "password123" # Set the buffer size bufferSize = 64 * 1024 # Encrypt…Python2 min readPython2 min read
Oct 9, 2022HACKTHEBOX (HTB) WRITEUP: AMBASSADOR [MEDIUM]SCANNING > TARGET=10.129.51.137 && nmap -p$(nmap -p- --min-rate=1000 -T4 $TARGET -Pn | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//) -sC -sV -Pn -vvv $TARGET -oN nmap_tcp_all.nmap PORT STATE SERVICE REASON VERSION 22/tcp…Htb5 min readHtb5 min read