Home
k4n3ki
Cancel

Solving flare-on challenge using DBI

Flare-on is an annual competition hosted by Mandiant, consisting of several reverse engineering challenges. It was first hosted in 2014. I stumbled upon a unique write-up by @gaasedelen for Flare-...

Luckbit Ransomware

Overview Malware is like a sneaky computer bug that can make your device sick. It’s a type of software that can cause problems by doing things you didn’t ask it to, like stealing your information ...

The Crime(Endpoint Forensics)

Content About Challenge Description Scenario Tools Question & Answers About Challenge Category : Endpoint Forensics Tags : Android, ALEAPP, sqlitebrowser Au...

GDB Python(pico CTF)

Content Tools used Easy as gdb Description Solution OTP Implementation Description Solution Tools Used python gdb-pwndbg angr IDA...

MSIL Torjan

Content IOCs Static Anaylsis Virustotal report File Metadata Capa Advanced Static & Dynamic Anaylsis DnSpy Localhost mapping Read da...

Dridex Trojan(Stealer)

Content: Overview Tools used Static Analysis IOCS DiE Virustotal Capa PEiD Technical Analysis API hashing Vectored Exception Han...

Malwy(Shellcode Execution)

Content About APIs UuidFromStringA EnumSystemLocalesA Challenge Description Walkthrough References About Executing shellcode is commonl...

Heaven's Gate Technique

About The term “Heaven’s Gate” in the context of Windows and the WOW64 (Windows on Windows 64-bit) subsystem refers to a technique used to transition from 32-bit code running in a 64-bit process t...

Insider(Endpoint Forensics)

Challenge Description Challenge Author: Champlain College Easy(4.5) Instructions: Unzip the challenge (pass: cyberdefenders.org) Load the AD1 image in FTK imager latest Windows version. S...

iloveyou Virus

ILOVEYOU Virus In 2000, the world witnessed one of the most notorious and devastating cyberattacks known as the ILOVEYOU virus. Operating under the disguise of a harmless love letter, this malic...