Search

6 min read
Malware Analysis: Process Injection in the REMCOS RAT
Process injection is one of those stealthy techniques malware loves to use to stay under the radar. By injecting malicious code into...
304 views


5 min read
Linux Firewalls: The Modern NFTable Firewall
Welcome back, my aspiring cyberwarriors! Firewalls play a key role in cybersecurity as they can filter out unwanted and malicious traffic...
928 views

4 min read
Network Forensics, Part 5: Wi-Fi (802.11) Forensics
Welcome back my aspiring DFIR analysts! In recent recent years, Wi-Fi has become ubiquitous throughout our home and working environments....
3,799 views

5 min read
Reverse Engineering Malware, Part 5: OllyDbg Basics
In this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and...
29,923 views

5 min read
Reverse Engineering Malware, Part 1: Getting Started
In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware....
31,181 views

3 min read
Digital Forensics, Part 3: Recovering Deleted Files
In the first two parts of this series, we captured a forensically sound image of the hard drive or other storage device and an image of...
37,982 views