Testing & Assessments Secure Planet provides cutting-edge penetration testing services for your company's networks and applications. With a team of certified and credentialed professionals, we find vulnerabilities that others can't.
Malware.lu CERT provides incident response support to all types of organisations. Malware.lu CERT can be in charge of the complete management of an incident or provide the technical support to the team already in charge of it. Last articles Agent Tesla stealer Strings Decryptor Published on 2018-07-06 08:00:00 AZORult stealer Published on 2018-05-04 08:00:00 WannaCry Published on 2017-05-15 14:54:
Monday and Wednesday: 1:00pm-2:15pm SOM 2.903 $Id: spring2012.t2t, v1.0, last updated Wed May 16 10:40:12 2012 Exp $ Course Overview CS-6V81 is a graduate level, research oriented, system and software security course. The goal of this course is to explain the low-level system details from compiler, linker, loader, to OS kernel and computer architectures, examine the weakest link in each system com
Using WinDbg for Exploit Development Notes The following are some notes that I found useful when using windbg for exploit development. Setting up the symbols! 0:001> .sympath SRV*http://msdl.microsoft.com/download/symbols Symbol search path is: SRV*http://msdl.microsoft.com/download/symbols Expanded Symbol search path is: srv*http://msdl.microsoft.com/download/symbols 0:011> .reload Reloading curr
detect emerging document threats Malware Tracker provides malware analysis, forensics, and security solutions for enterprise. Use Malware Tracker technology to detect malicious document attachments at the email gateway, and to automate the static analysis of PDF, and common document formats. Home of the free online PDF Examiner - the only web based PDF malware analysis suite and the Cryptam docume
This cheat sheet presents tips for analyzing and reverse-engineering malware. It outlines the steps for performing behavioral and code-level analysis of malicious software. To print it, use the one-page PDF version; you can also edit the Word version to customize it for you own needs. Overview of the Malware Analysis ProcessUse automated analysis sandbox tools for an initial assessment of the susp
OllyDRX 1.10 Ultimate February 11, 2009 Posted by reversengineering in DEBUGGER, TOOLS. trackback OllyDbg 1.10: ———————————————————————- + New look + Modified code for almost perfect hiding + Win32 API help reference + Modified code for expanded windows + Modified code for %s overflow RCE exploit + Modified code to make symbols load properly + ON2O Plugin Patcher + Plugin Development Kit
PDFStreamDumper is a PDF analyzer developed by Sandsprite’s David Zimmer. He has added quite a bit of useful functions to make this an all-in-one, go-to tool as you’ll soon see. Here’s a spear-phish email that contains a malicious PDF file attachment: This PDF file is quite unusual. When you view it in Notepad, you normally can see readable strings and the magic bytes at the beginning. In this cas
List of Sandboxes for Malware Analysis!PenTestIT Your source for Information Security Related information! We had done a similar post - way back in 2009 – titled List of Online Malware Scanners. Cut to the end of 2011, we now bring you a list of free sandboxes for malware analysis. Most of them are free and open source products. However, we also have included a few commercial versions and those th
The last week was held in Barcelona the NoConName security conference, and I had the pleasure of attending to give a security conference about Android. It talked about how to perform a dynamic analysis, static and forensic skip protection and release application along with our friend of MalwareIntelligence too, Ehooo, a small PoC reveals a vulnerability of Tap-Jacking. For those who could not
Edith Cowan University Edith Cowan University Research Online Research Online Theses: Doctorates and Masters Theses 2010 Analysis avoidance techniques of malicious software Analysis avoidance techniques of malicious software Murray Brand Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/theses Part of the Computer Sciences Commons Recommended Citation Recommended Ci
This article will focus on Stuxnet’s windows infection methods and spreading methods. The tricks were used by stuxnet and the evidences behind the criminals of stuxnet. Download the Article in PDF - 2.17 MB Table Of Contents 1. Introduction: 2. Payload: 3. Suspects: 4. Technical Details: 4.1.Stuxnet Live Cycle 4.2. Main Dropper (~WTR4132.TMP) 4.3. Main Stuxnet DLL 4.3.1. Escalating the Privilege
Free course demos allow you to see course content, watch world-class instructors in action, and evaluate course difficulty.
After giving my Malicious PDF Analysis workshop at Hack In The Box Amsterdam, I decided to produce a screencast for each exercise (there are 20 exercises). You can find the first screencasts here. More will be produced soon. Materials you’ll need for the exercises: my PDF tools the exercises themselves (password for the ZIP file is “infected” without the double-quotes; there’s no malware in the ex
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く