Practical Binary Analysis Book authored by Dennis Andriesse covers all major binary analysis topics in an accessible way, from binary formats, disassembly, and basic analysis to advanced techniques...
Solving flare-on challenge using DBI
Flare-on is an annual competition hosted by Mandiant, consisting of several reverse engineering challenges. It was first hosted in 2014. I stumbled upon a unique write-up by @gaasedelen for Flare-...
Luckbit Ransomware
Overview Malware is like a sneaky computer bug that can make your device sick. It’s a type of software that can cause problems by doing things you didn’t ask it to, like stealing your information ...
The Crime(Endpoint Forensics)
Content About Challenge Description Scenario Tools Question & Answers About Challenge Category : Endpoint Forensics Tags : Android, ALEAPP, sqlitebrowser Au...
GDB Python(pico CTF)
Content Tools used Easy as gdb Description Solution OTP Implementation Description Solution Tools Used python gdb-pwndbg angr IDA...
CrimsonRAT
Content IOCs Static Anaylsis Virustotal report File Metadata Capa Advanced Static & Dynamic Anaylsis DnSpy Localhost mapping Read da...
Dridex Trojan(Stealer)
Content: Overview Tools used Static Analysis IOCS DiE Virustotal Capa PEiD Technical Analysis API hashing Vectored Exception Han...
Malwy(Shellcode Execution)
Content About APIs UuidFromStringA EnumSystemLocalesA Challenge Description Walkthrough References About Executing shellcode is commonl...
Heaven's Gate Technique
About The term “Heaven’s Gate” in the context of Windows and the WOW64 (Windows on Windows 64-bit) subsystem refers to a technique used to transition from 32-bit code running in a 64-bit process t...
Insider(Endpoint Forensics)
Challenge Description Challenge Author: Champlain College Easy(4.5) Instructions: Unzip the challenge (pass: cyberdefenders.org) Load the AD1 image in FTK imager latest Windows version. S...