Skip to content

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis

by Rio Asmara Suryadi

  • Home
  • Penentration Test
  • Reverse Engineering
  • Malware
  • About

Month: June 2020

Openssl for reverse shell

June 22, 2020 rioasmara

Guys, Today I am going to write about openssl as an alternative to create reverse shell as the help for your pentest journey. Sometimes during

Continue reading

MALWARE, HIDING API CALL FROM STATIC ANALYSES 2

June 15, 2020 rioasmara

Hi Guys, In my previous post we discussed about how to hide the API call with the help of dynamic loading so that the API

Continue reading

Malware, hiding api call from static analyses 1

June 14, 2020 rioasmara

I would like to share a very simple way of hiding your API call from static analyses. Actually, there are many ways to hide it

Continue reading

help!! run-as please

June 13, 2020 rioasmara

Hi Pentester, Maybe after you can compromise a system and get the windows administrator account password and you might get stucked to run a command

Continue reading

Enumeration with burp intruder

June 10, 2020 rioasmara

Hi Everyone, It is like a week i did not post any article. Today I am going to share a simple way to enumerate web

Continue reading

root#whoami

Unknown's avatarRio Asmara Suryadi is a highly experienced cybersecurity professional with over 20 years in the field, specializing in cyber defense, malware analysis, penetration testing, and security architecture across diverse industries including Oil & Gas, Banking, and Energy. He possesses a strong background in leading SOC operations, threat hunting, implementing robust security solutions, and has a notable history of software development. Rio is also dedicated to knowledge sharing, evidenced by his cybersecurity blog and his role as the founder of Beruang Cyber, a cybersecurity community in Indonesia.

Recent

  • MFT Reader: A Forensic Analyst’s Guide to Finding What Happened on Disk
  • AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught
  • Revolutionizing Incident Response: How AI-Powered Forensic Analysis Transforms CyberTriage Investigations
  • The Silent Kill Chain: From RID Cycling to AD CS Template Injection
  • Supercharging Velociraptor with AI and Cursor
Blog at WordPress.com.
  • Subscribe Subscribed
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Join 43 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar