Published inInfoSec Write-upsWhat’s the Secret? Unpacking Command-Line Argument ManipulationAdversaries continually evolve their tactics to evade security defenses, and command-line argument spoofing is a particularly stealthy…Feb 101Feb 101
Published inInfoSec Write-upsReading Between the Lines of Code: Ziraat_StealerHello Everybody! Today i will be conducting an analysis of a .NET information stealer.Apr 29, 2024111Apr 29, 2024111
Published inInfoSec Write-upsTypo Trouble: Exploring the Telegram Python RCE VulnerabilityTelegram’s Windows application was recently updated to address a critical zero-day flaw that permitted the execution of Python scripts…Apr 20, 202472Apr 20, 202472
Published inInfoSec Write-upsMy Journey with CRTO: A ReviewI’m excited to announce my recent achievement: successfully passing the Red Team Operator (RTO) exam offered by Zero Point Security. This…Apr 11, 202410Apr 11, 202410
Published inInfoSec Write-upsWindows Security: Using AMSI to Analyze Malicious JavaScriptAMSI : Anti-Malware Scan InterfaceFeb 21, 20244Feb 21, 20244
Published inInfoSec Write-upsThe Ping of Death: How ICMP Packets Can Be Used for Data Ex-filtrationSuppose you are a system administrator for a big business and you just found out that a third party has obtained some of your confidential…Feb 1, 202442Feb 1, 202442
Published inInfoSec Write-upsCode caving attacks: How Hackers Stitch Together CodeCode caving attacks usually exploit unused memory areas in legitimate programs, by concealing malicious code with sophistication. This form…Jan 12, 20247Jan 12, 20247
Published inInfoSec Write-upsThe Art of Obfuscation: Evading Static Malware DetectionDec 25, 20236Dec 25, 20236
Published inInfoSec Write-upsUnmasking NJRAT: A Deep Dive into a Notorious Remote Access Trojan Part2In the first part of this blog series, we discussed how the malware NjRAT is built , its capabilities and more.In this blog we will…Nov 26, 202314Nov 26, 202314
Published inInfoSec Write-upsOpening HTML Files : A gateway to MalwareThis blog post examines how the ability to run VBscript / Jscript from HTML files in windows environment is being abused.This post is…Nov 10, 2023Nov 10, 2023