Safecracker Malware Analysis on HTB
Intro: Safecracker is a retired(writeups enabled) Sherlock room located on Hack The Box. “With Sherlock levels you will be asked to dive into the aftermath of a targeted cyber attack and unravel th...
Intro: Safecracker is a retired(writeups enabled) Sherlock room located on Hack The Box. “With Sherlock levels you will be asked to dive into the aftermath of a targeted cyber attack and unravel th...
Intro: Malbuster is a premium room located on Try Hack Me. It is designed around the idea of being tasked with analyzing a sample from your SOC team. link to room: https://tryhackme.com/r/room/mal...
Intro: Subatomic is a retired(writeups enabled) Sherlock room located on Hack The Box. “With Sherlock levels you will be asked to dive into the aftermath of a targeted cyber attack and unravel the ...
What is the Kernel? In the simplest terms possible the kernel is like a bridge between the software and the bare bones hardware. The kernel has full access to the hardware of the computer and can u...
Many malware authors do not want their payloads to be easily reversible and they will partake in various methods to deter an analyst from studying the binary. Some of these methods are to utilize e...
What is the PE File Format? The PE file format is the Portable Executable file format. All windows executables and object files follow the PE file structure. There is a lot of detail about why th...
Basics of Assembly for Makers and Hackers Assembly language is a low-level programming language that serves as a direct link between high-level languages and machine code, which provides instructi...
Below categories of malware will be covered then research strategies and industry frameworks will be discussed. Various malware types will be listed and briefly described, the MITRE ATT&CK fram...
Setting up Flare VM for Malware Analysis In this guide we are going to learn how to setup a safe and practical lab enviroment for malware analysis. We will be focusing on a windows lab enviroment ...