Open in app

Sign in

Medium Logo
Write

Sign in

ka1d0
ka1d0

150 followers

Home

About

Bitcoin Blockchain as a Graph in Neo4j

Blockchain is one of the top technology trends of our times. It was originally invented by Satoshi Nakamoto as a public, distributed…

Sep 20, 2019
Bitcoin Blockchain as a Graph in Neo4j
Bitcoin Blockchain as a Graph in Neo4j
Sep 20, 2019

Malware Analysis — Gozi/Ursnif Downloader

In the previous article, we looked at basic dynamic analysis of a NanoCore variant. In this article, we’ll be analyzing a VBA malware…

Sep 10, 2019
Malware Analysis — Gozi/Ursnif Downloader
Malware Analysis — Gozi/Ursnif Downloader
Sep 10, 2019

Malware Analysis — NanoCore

In my previous article, we analyzed the famous ransomware, WannaCry which wreaked havoc in 2017. In this article, we’ll be looking at a…

Sep 5, 2019
Malware Analysis — NanoCore
Malware Analysis — NanoCore
Sep 5, 2019

Malware Analysis — WannaCry

In the previous article, we analyzed an Android malware (DroidDream) for a change. Now, we’re back to Windows malware and a very famous…

Sep 3, 2019
Malware Analysis — WannaCry
Malware Analysis — WannaCry
Sep 3, 2019

Android Malware Analysis — DroidDream

All the malware analysis related articles on my blog so far have been PE malware. But malware isn’t restricted to Windows OS. There are…

Jul 28, 2019
Android Malware Analysis — DroidDream
Android Malware Analysis — DroidDream
Jul 28, 2019

Pentesting — VulnHub: DC-2

In the last article, we rooted a VulnHub machine — DC-1. Moving on to the next machine in the series, we’re going to look at DC-2. The…

Jun 27, 2019
Pentesting — VulnHub: DC-2
Pentesting — VulnHub: DC-2
Jun 27, 2019

Pentesting — VulnHub: DC-1

This post is one of the many that I’ll be writing on basic pentesting. VulnHub is a fantastic starting point for those who are beginners…

Jun 27, 2019
Pentesting — VulnHub: DC-1
Pentesting — VulnHub: DC-1
Jun 27, 2019

String Deobfuscation using SMT Solver

Most malware authors employ string obfuscation techniques to hide important strings from malware analysts. Usually, my approach to…

May 12, 2019
String Deobfuscation using SMT Solver
String Deobfuscation using SMT Solver
May 12, 2019

Using Steganography to Distribute Malware?

Steganography is a well-known concept. It involves hiding secret data inside another carrier file. In general, the carrier is usually an…

Apr 20, 2019
Using Steganography to Distribute Malware?
Using Steganography to Distribute Malware?
Apr 20, 2019

Writing Basic Splunk Rules

The 21st century is the age where information is power. This information comes in various forms of machine data which is generated by a…

Apr 20, 2019
Writing Basic Splunk Rules
Writing Basic Splunk Rules
Apr 20, 2019
ka1d0

ka1d0

150 followers

A budding malware analyst and threat researcher. https://www.linkedin.com/in/nikhilh2/

Following
  • Katie Nickels

    Katie Nickels

  • Blake Strom

    Blake Strom

  • Vishal Thakur

    Vishal Thakur

  • Coding_Karma

    Coding_Karma

See all (30)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech