Dec 14, 20217 minExploiting log4j | Apache SolrLog4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
Mar 18, 20237 minManually unpacking a UPX packed binaryManually unpacking a binary that was packed with UPX, using two different methods including finding a tailjump and the pushad instruction.
Nov 20, 20223 minRansomware investigation using Splunk - BlackSunIn this write up, we will be assuming the role of a SOC analyst investigating a ransomware incident using Splunk. The task is to...
Nov 20, 20225 minIcedID malware analysisMalware analysis of an IcedID dropper contacting hxxps[://]hardenpasedaken[.]com C&C server.
Sep 1, 20226 minSilly Putty Malware AnalysisAfter completing the PMAT course, something set into motion. My new found passion for Malware Analysis. This will be the second time I...
Aug 24, 20225 minPython bank card stealerOver the past couple of months I have dived deep into malware analysis and reverse engineering. Completing the PMAT course and enrolling...
Jun 26, 20223 minMcAfee quarantine files - Automating BUP file analysis.Quarantine (.BUP) files, otherwise known as BackUp files, are created by various applications such as McAfee antivirus. McAfee will...
May 22, 20214 minMalicious office macro analysisIn this blog post, we will creating a malicious macro that allows us to catch a reverse shell when a word document is opened. We will...