Project Sodinokibi
Malware Bazaar and VirusTotal platforms revealed some interesting insights into who manages Sodinokibi, from the perspective of incident response.
Malware Bazaar and VirusTotal platforms revealed some interesting insights into who manages Sodinokibi, from the perspective of incident response.
My own reverse engineering of a WannaCry sample.
...or in other words, when failing to reverse a CTF binary makes you loose a job
In this tutorial we'll fix U-Boot on default Kali Linux 2018.4 on the SolidRun Cubox-i4Pro.
During last months, my interest in hardware hacking got an exponential growth due to the fact I had the chance to get my hands on some so-ho routers unretired from local Telcos. So what a great opportunity to open and try to crack them, without worrying about irreparable damage? Inspecting
In this post we continue the analysis of the Pony sample.
In this post we go further into the analysis of the sample unpacked in the previous part.
During my day by day job, I had the chance to came across a mail that was blocked by an antispam platform. Attached to this mail there was a sample recognized as a variant of Pony Stealer malware. Since I've been greatly interested into malware analysis in the
This writeup covers the Vulnhub CTF machine named Homeless by Min Ko Ko.