Hi Guys Today, I will be sharing fundamental concepts malware development. This session will focus on the elementary aspects of executing a malicious payload with
Category: Reverse Engineering
Reverse, Enumerate Windows API
I would like to share a basic tutorial on reverse engineering related to Windows API calls. This tutorial will involve reviewing a substantial amount of
Forensic on Victim of CVE-2023-38146 and CVE-2023-28252
Just to continue from my previous post, I conducted an exercise involving the exploitation of a host specifically designed to contain two vulnerabilities: CVE-2023-38146 and
Payload injection with NtCreateSection and NtMapViewOfSection
This is yet another technique for injecting payloads into memory. We recognize that the majority of the techniques used involve similar steps. Nowadays, EDR is
IR Analysis on PSEXEC and Persistence
As the incident responder, evaluating a security breach can be a stimulating task. It requires the ability to connect various pieces of information in order
Python Extracting Malware Configuration
My Friends, Just a quick simple and very basic tutorial on how to create an automation to extract malware configuration from PE file. I made