Skip to content

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis

by Rio Asmara Suryadi

  • Home
  • Penentration Test
  • Reverse Engineering
  • Malware
  • About

Tag: security

MFT Reader: A Forensic Analyst’s Guide to Finding What Happened on Disk

February 28, 2026 rioasmara

Introduction MFT Reader is a forensic GUI application that analyzes the NTFS Master File Table ($MFT) and USN Change Journal ($J) to surface suspicious filesystem

Continue reading

AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught

February 1, 2026 rioasmara

If you’ve ever had a beacon or Meterpreter payload flattened by AMSI, or watched your one-liner get flagged before it could even run, you know

Continue reading

The Silent Kill Chain: From RID Cycling to AD CS Template Injection

January 11, 2026 rioasmara

In modern Active Directory (AD) engagements, the path to Domain Admin is rarely paved with zero-day exploits. Instead, it is constructed from “features”—misconfigured permissions, legacy

Continue reading

Shellcode & The Art of In-Memory Code Injection: A Deep Dive for Security Enthusiasts

May 30, 2025 rioasmara

Ever wondered how attackers manage to sneak their malicious code into running programs without triggering alarms? The answer often lies in a sophisticated technique called

Continue reading

root#whoami

Unknown's avatarRio Asmara Suryadi is a highly experienced cybersecurity professional with over 20 years in the field, specializing in cyber defense, malware analysis, penetration testing, and security architecture across diverse industries including Oil & Gas, Banking, and Energy. He possesses a strong background in leading SOC operations, threat hunting, implementing robust security solutions, and has a notable history of software development. Rio is also dedicated to knowledge sharing, evidenced by his cybersecurity blog and his role as the founder of Beruang Cyber, a cybersecurity community in Indonesia.

Recent

  • MFT Reader: A Forensic Analyst’s Guide to Finding What Happened on Disk
  • AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught
  • Revolutionizing Incident Response: How AI-Powered Forensic Analysis Transforms CyberTriage Investigations
  • The Silent Kill Chain: From RID Cycling to AD CS Template Injection
  • Supercharging Velociraptor with AI and Cursor
Blog at WordPress.com.
  • Subscribe Subscribed
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Join 43 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar