malware analysis
Project Sodinokibi
Malware Bazaar and VirusTotal platforms revealed some interesting insights into who manages Sodinokibi, from the perspective of incident response.
malware analysis
Malware Bazaar and VirusTotal platforms revealed some interesting insights into who manages Sodinokibi, from the perspective of incident response.
malware analysis
My own reverse engineering of a WannaCry sample.
CTF
...or in other words, when failing to reverse a CTF binary makes you loose a job
embedded device
In this tutorial we'll fix U-Boot on default Kali Linux 2018.4 on the SolidRun Cubox-i4Pro.
reverse engineering
During last months, my interest in hardware hacking got an exponential growth due to the fact I had the chance to get my hands on some so-ho routers unretired from local Telcos. So what a great opportunity to open and try to crack them, without worrying about irreparable damage? Inspecting
malware analysis
In this post we continue the analysis of the Pony sample.
malware analysis
In this post we go further into the analysis of the sample unpacked in the previous part.
malware analysis
During my day by day job, I had the chance to came across a mail that was blocked by an antispam platform. Attached to this mail there was a sample recognized as a variant of Pony Stealer malware. Since I've been greatly interested into malware analysis in the
CTF
This writeup covers the Vulnhub CTF machine named Homeless by Min Ko Ko.