malware analysis Featured Project Sodinokibi Malware Bazaar and VirusTotal platforms revealed some interesting insights into who manages Sodinokibi, from the perspective of incident response.
malware analysis Featured WannaCry, two years later: a deep look into its code My own reverse engineering of a WannaCry sample.
CTF An extensive step by step reverse engineering analysis of a Linux CTF binary ...or in other words, when failing to reverse a CTF binary makes you loose a job
embedded device How to fix and boot Kali Linux on the SolidRun CuBox-i4Pro In this tutorial we'll fix U-Boot on default Kali Linux 2018.4 on the SolidRun Cubox-i4Pro.
reverse engineering Reverse engineering the router Technicolor TG582N During last months, my interest in hardware hacking got an exponential growth due to the fact I had the chance to get my hands on some so-ho routers unretired from local Telcos. So what a great opportunity to open and try to crack them, without worrying about irreparable damage? Inspecting
malware analysis Pony stealer: a malware analysis - The sample analysis - Part three In this post we continue the analysis of the Pony sample.
malware analysis Pony stealer: a malware analysis - The sample dry run - Part two In this post we go further into the analysis of the sample unpacked in the previous part.
malware analysis Pony stealer: a malware analysis - Unpacking the sample - Part one During my day by day job, I had the chance to came across a mail that was blocked by an antispam platform. Attached to this mail there was a sample recognized as a variant of Pony Stealer malware [https://blog.malwarebytes.com/detections/spyware-pony/]. Since I've been greatly interested into
CTF Vulnhub Homeless - Writeup This writeup covers the Vulnhub CTF machine named Homeless by Min Ko Ko.