Posts by year

2024

Back to Top ↑

2023

Back to Top ↑

2022

Retrospect and future plans - Pt. 2

8 minute read

A new job, graduation internship, a shift of focus towards Android malware analysis, and more… It’s been about 6 months since I posted one of these, so I gue...

Practical Malware Analysis - Lab 12 write-up

12 minute read

Covert malware launching is the subject of Chapter 12, and discusses some of the many techniques that malware authors have developed to blend their malware ...

Practical Malware Analysis - Lab 11 write-up

6 minute read

Chapter 11 - “Malware Behavior” is the first chapter of part 4 in the Practical Malware Analysis book. Part 4 is all about malware functionality. Chapter 11...

Practical Malware Analysis - Lab 10 write-up

9 minute read

Kernel Debugging with WinDbg is the subject of Chapter 10. From this chapter I learned: How to set-up kernel debugging on a VM Useful commands for kern...

Practical Malware Analysis - Lab 9 write-up

13 minute read

Since Chapter 8 did not include any lab assignments, we continue this series with Chapter 9: OllyDbg. From this Chapter we (obviously) learned about OllyDbg...

Practical Malware Analysis - Lab 7 write-up

8 minute read

Chapter 7 of the Practical Malware Analysis book covers some unique ways that malware uses Windows functionality. The chapter starts off with an overview of...

Practical Malware Analysis - Lab 6 write-up

9 minute read

Chapter 6 is all about recognizing C code constructs in x86 assembly. A code construct defines a functional property within code but not the details of its ...

Practical Malware Analysis - Lab 5 write-up

13 minute read

The third chapter to contain lab assignments is Chapter 5: “IDA PRO”. As the name suggests, this chapter discusses the use of the Interactive Disassembler t...

Practical Malware Analysis - Lab 3 write-up

8 minute read

Chapter 3 of the Practical Malware Analysis book is the second chapter to contain lab assignments. Chapter 3 is all about basic dynamic analysis, and is des...

Practical Malware Analysis - Lab 1 write-up

15 minute read

Practical Malware Analysis is a book that is often recommended by people that perform malware analysis. I’ve recently started reading this book and it’s bee...

Reversing an Emotet MalDoc

8 minute read

Malicious Word documents are extremely common nowadays, and are usually the cause of most malware infections as a result of succesful phishing. Some malware ...

Retrospect and future plans - Pt. 1

6 minute read

It’s been a while… Since I haven’t been active on my blog in the past two months: this is going to be more of a random post, describing things that have happ...

How to conduct a Social Engineering pentest

11 minute read

What is Social Engineering? Social Engineering can be defined as follows: “Influencing a person to take an action that benefits the influencer”. Other defini...

Alternate Data Streams

4 minute read

What are Alternate Data Streams? An Alternate Data Stream (ADS) is a file attribute in NTFS (the main file system format in Windows). Files and folders withi...

Back to Top ↑