Skip to content

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis

by Rio Asmara Suryadi

  • Home
  • Penentration Test
  • Reverse Engineering
  • Malware
  • About

Month: September 2019

Pentest 2 : [htb] Silo, Exploitation Oracle

September 30, 2019 rioasmara

Hi All, I would like to continue the last article about hacking Silo from hack the box PenTest box. The last steps that we have

Continue reading

Pentest 1 : [htb] Silo, Hack Oracle

September 29, 2019 rioasmara

Hi everyone, Today I am going to write a little walk-through of a box from hack the box lab. I am going to explain the

Continue reading

Basic : Extracting Malware from memory

September 28, 2019 rioasmara

Hi All, I would like to share a bit regarding the basic information about extracting malware from the dump memory using a powerful application called

Continue reading

Little mistake that kills

September 22, 2019 rioasmara

Hi All, Today I am writting about a small mistake that system admin might do in configuring their linux system. As usuall, After the admin

Continue reading

I am back …

September 19, 2019 rioasmara

Hi All, After few months stop posting any update of any tutorial about pentesting, now I am back. I am sorry that there were some

Continue reading

root#whoami

Unknown's avatarRio Asmara Suryadi is a highly experienced cybersecurity professional with over 20 years in the field, specializing in cyber defense, malware analysis, penetration testing, and security architecture across diverse industries including Oil & Gas, Banking, and Energy. He possesses a strong background in leading SOC operations, threat hunting, implementing robust security solutions, and has a notable history of software development. Rio is also dedicated to knowledge sharing, evidenced by his cybersecurity blog and his role as the founder of Beruang Cyber, a cybersecurity community in Indonesia.

Recent

  • MFT Reader: A Forensic Analyst’s Guide to Finding What Happened on Disk
  • AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught
  • Revolutionizing Incident Response: How AI-Powered Forensic Analysis Transforms CyberTriage Investigations
  • The Silent Kill Chain: From RID Cycling to AD CS Template Injection
  • Supercharging Velociraptor with AI and Cursor
Blog at WordPress.com.
  • Subscribe Subscribed
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Join 43 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar