Bitcoin Blockchain as a Graph in Neo4jBlockchain is one of the top technology trends of our times. It was originally invented by Satoshi Nakamoto as a public, distributed…Sep 20, 2019Sep 20, 2019
Malware Analysis — Gozi/Ursnif DownloaderIn the previous article, we looked at basic dynamic analysis of a NanoCore variant. In this article, we’ll be analyzing a VBA malware…Sep 10, 2019Sep 10, 2019
Malware Analysis — NanoCoreIn my previous article, we analyzed the famous ransomware, WannaCry which wreaked havoc in 2017. In this article, we’ll be looking at a…Sep 5, 2019Sep 5, 2019
Malware Analysis — WannaCryIn the previous article, we analyzed an Android malware (DroidDream) for a change. Now, we’re back to Windows malware and a very famous…Sep 3, 2019Sep 3, 2019
Android Malware Analysis — DroidDreamAll the malware analysis related articles on my blog so far have been PE malware. But malware isn’t restricted to Windows OS. There are…Jul 28, 2019Jul 28, 2019
Pentesting — VulnHub: DC-2In the last article, we rooted a VulnHub machine — DC-1. Moving on to the next machine in the series, we’re going to look at DC-2. The…Jun 27, 2019Jun 27, 2019
Pentesting — VulnHub: DC-1This post is one of the many that I’ll be writing on basic pentesting. VulnHub is a fantastic starting point for those who are beginners…Jun 27, 2019Jun 27, 2019
String Deobfuscation using SMT SolverMost malware authors employ string obfuscation techniques to hide important strings from malware analysts. Usually, my approach to…May 12, 2019May 12, 2019
Using Steganography to Distribute Malware?Steganography is a well-known concept. It involves hiding secret data inside another carrier file. In general, the carrier is usually an…Apr 20, 2019Apr 20, 2019
Writing Basic Splunk RulesThe 21st century is the age where information is power. This information comes in various forms of machine data which is generated by a…Apr 20, 2019Apr 20, 2019