Skip to content

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis

by Rio Asmara Suryadi

  • Home
  • Penentration Test
  • Reverse Engineering
  • Malware
  • About

Month: October 2021

Create .sig file from .lib for IDA

October 24, 2021 rioasmara

I like to share about how to generate a .sig file in order to help IDA to detect the function during reversing the code. It

Continue reading

Supply Chain Attack – PHP 8.1.0-dev Backdoor

October 23, 2021 rioasmara

I would like to discuss the attack that happened on May 2021 to one of the biggest web programming language that support about 79% web

Continue reading

Parsing Export Function from PE Manually

October 17, 2021 rioasmara

Here is the next post that I promissed to create a simple list of the export function manually with C code. Why parsing manually of

Continue reading

C Code Parsing PE with Corkami Offset

October 16, 2021 rioasmara

Today, I want to write about small C code that enable you to listing out dll export and parsing some PE values from the headers.

Continue reading

Analyze DLL Export with PE Bear

October 10, 2021 rioasmara

Hi Fellows, After quite sometimes that having no update on the blog especially things related to reverse engineering. In this session, I would like to

Continue reading

root#whoami

Unknown's avatarRio Asmara Suryadi is a highly experienced cybersecurity professional with over 20 years in the field, specializing in cyber defense, malware analysis, penetration testing, and security architecture across diverse industries including Oil & Gas, Banking, and Energy. He possesses a strong background in leading SOC operations, threat hunting, implementing robust security solutions, and has a notable history of software development. Rio is also dedicated to knowledge sharing, evidenced by his cybersecurity blog and his role as the founder of Beruang Cyber, a cybersecurity community in Indonesia.

Recent

  • MFT Reader: A Forensic Analyst’s Guide to Finding What Happened on Disk
  • AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught
  • Revolutionizing Incident Response: How AI-Powered Forensic Analysis Transforms CyberTriage Investigations
  • The Silent Kill Chain: From RID Cycling to AD CS Template Injection
  • Supercharging Velociraptor with AI and Cursor
Blog at WordPress.com.
  • Subscribe Subscribed
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Join 43 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar