Venom BTLO - Incident Response
Scenario We got you the /var/log folder of one of the compromised ubuntu server. Investigate the logs and figure out the point of entry of the attacker. You have raw logs (/var/log in Desktop), us...
Scenario We got you the /var/log folder of one of the compromised ubuntu server. Investigate the logs and figure out the point of entry of the attacker. You have raw logs (/var/log in Desktop), us...
General This application was implemented as part of the System Programming course at the university. Course content: Executable file format. Code portability. Debugging and profiling progr...
Introduction As a malware developer, one will have several options as to where the payload can be stored within the PE file. Depending on the choice, the payload will reside in a different section...
Introduction The Windows API provides developers with a way for their applications to interact with the Windows operating system. For example, if the application need to display something on the...
What is Malware? Malware is a type of software specifically designed to perform malicious actions such as gaining unauthorized access to a machine or stealing sensitive data from a machine. The ...
Sometimes you need to download and install new software, as well as send and download multiple large files. These tasks are easier if these files are compressed and combined into a single file. ...
The Goals of Malware Analysis Incident Response Case history – A medical clinic with 10 offices found malware on one of their workstations – Hired a consultant to clean & re-image that m...