Windows PE Malware Analysis Part IV
Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...
Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...
Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...
Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...
Introduction In this article I will be examining a Windows executable malware specimen. Based on a couple reports from automated malware sandboxes, the spec...
In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...
Shortly after passing OSWE, I began the course work for Evasion Techniques and Breaching Defenses which is another one of Offsec’s OSCE3 certifications. In...
After a bit of a hiatus from studying for certifications, I became interested in the new certification bundle by Offensive Security. The new OSCE3 is obtai...
A list of bookmarks I have used since I started my journey in cyber security. Some old, some new. I hope you find it of use. NOTE: Some links may be broken ...
Let me start by thanking my wife for putting up with my obsession with all these cyber shenanigans. She has been with me since before I was working my firs...
While studying for the Offensive Security Certified Expert (OSCE), I took some time to practice writing custom shellcode and read up on how certain Windows...