Skip to content

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis

by Rio Asmara Suryadi

  • Home
  • Penentration Test
  • Reverse Engineering
  • Malware
  • About

Month: March 2022

Nginx and Tomcat Mutual Auth Bypass

March 21, 2022 rioasmara

I would like to share a common mistake on Nginx configuration which could lead to authentication bypass. We are going to try to bypass Nginx

Continue reading

Ansible Playbook Weaponization

March 21, 2022 rioasmara

Lets do some hacking today, I am going to share a small tutorial on weaponizing ansible playbook to compromise the victim machine. Ansible Playbook Playbooks

Continue reading

Jenkins and OS Command Execution via Build

March 19, 2022 rioasmara

Hi Friends 🙂 I would like to share another tutorial for penetration testing on utilizing Jenkins build capability to allow you to do OS command

Continue reading

Less suspicious with module stomping

March 13, 2022 rioasmara

Hi Friends, I would like to continue on sharing a simple tutorial on making your payload injection less supicious to AV detection. As a common

Continue reading

HellGate Technique on AV Bypass

March 9, 2022 rioasmara

Hi Friends, Yet another simple tutorial post regarding on how to bypass AV detection during payload injection. As mentioned in my previous post that one

Continue reading

root#whoami

Unknown's avatarRio Asmara Suryadi is a highly experienced cybersecurity professional with over 20 years in the field, specializing in cyber defense, malware analysis, penetration testing, and security architecture across diverse industries including Oil & Gas, Banking, and Energy. He possesses a strong background in leading SOC operations, threat hunting, implementing robust security solutions, and has a notable history of software development. Rio is also dedicated to knowledge sharing, evidenced by his cybersecurity blog and his role as the founder of Beruang Cyber, a cybersecurity community in Indonesia.

Recent

  • MFT Reader: A Forensic Analyst’s Guide to Finding What Happened on Disk
  • AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught
  • Revolutionizing Incident Response: How AI-Powered Forensic Analysis Transforms CyberTriage Investigations
  • The Silent Kill Chain: From RID Cycling to AD CS Template Injection
  • Supercharging Velociraptor with AI and Cursor
Blog at WordPress.com.
  • Subscribe Subscribed
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Join 43 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar