top of page
Blog Posts


Exploiting log4j | Apache Solr
Log4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
Dec 14, 20217 min read


Manually unpacking a UPX packed binary
Manually unpacking a binary that was packed with UPX, using two different methods including finding a tailjump and the pushad instruction.
Mar 18, 20237 min read


Ransomware investigation using Splunk - BlackSun
In this write up, we will be assuming the role of a SOC analyst investigating a ransomware incident using Splunk. The task is to...
Nov 20, 20223 min read


IcedID malware analysis
Malware analysis of an IcedID dropper contacting hxxps[://]hardenpasedaken[.]com C&C server.
Nov 20, 20225 min read


Silly Putty Malware Analysis
After completing the PMAT course, something set into motion. My new found passion for Malware Analysis. This will be the second time I...
Sep 1, 20226 min read


Python bank card stealer
Over the past couple of months I have dived deep into malware analysis and reverse engineering. Completing the PMAT course and enrolling...
Aug 24, 20225 min read


McAfee quarantine files - Automating BUP file analysis.
Quarantine (.BUP) files, otherwise known as BackUp files, are created by various applications such as McAfee antivirus. McAfee will...
Jun 26, 20223 min read


Post compromise analysis | Overpass 2
In this write up, we will be playing the role of an incident responder, post compromise of a system. The task is to identify what the...
Jan 16, 20223 min read


Unleashing the Power of Hydra for Brute Force Login Attacks
Hydra is a very powerful and fast password cracking tool which can also perform dictionary attacks against a wide range of protocols such...
Jan 9, 20224 min read


Exploiting log4j | Apache Solr
Log4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
Dec 14, 20217 min read
bottom of page