Posts by Tag

exploit development

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

ETBD/OSEP Review

3 minute read

Shortly after passing OSWE, I began the course work for Evasion Techniques and Breaching Defenses which is another one of Offsec’s OSCE3 certifications. In...

AWAE/OSWE Review

3 minute read

After a bit of a hiatus from studying for certifications, I became interested in the new certification bundle by Offensive Security. The new OSCE3 is obtai...

Cyber Bookmarks

2 minute read

A list of bookmarks I have used since I started my journey in cyber security. Some old, some new. I hope you find it of use. NOTE: Some links may be broken ...

CTP/OSCE Review

3 minute read

Let me start by thanking my wife for putting up with my obsession with all these cyber shenanigans. She has been with me since before I was working my firs...

Compiling and Running Custom Shellcode

3 minute read

While studying for the Offensive Security Certified Expert (OSCE), I took some time to practice writing custom shellcode and read up on how certain Windows...

Back to Top ↑

reverse engineering

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Windows PE Malware Analysis Part III

11 minute read

Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...

Windows PE Malware Analysis Part II

12 minute read

Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...

Windows PE Malware Analysis Part I

10 minute read

Introduction In this article I will be examining a Windows executable malware specimen. Based on a couple reports from automated malware sandboxes, the spec...

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Cyber Bookmarks

2 minute read

A list of bookmarks I have used since I started my journey in cyber security. Some old, some new. I hope you find it of use. NOTE: Some links may be broken ...

Back to Top ↑

malware

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Windows PE Malware Analysis Part III

11 minute read

Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...

Windows PE Malware Analysis Part II

12 minute read

Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...

Windows PE Malware Analysis Part I

10 minute read

Introduction In this article I will be examining a Windows executable malware specimen. Based on a couple reports from automated malware sandboxes, the spec...

Cyber Bookmarks

2 minute read

A list of bookmarks I have used since I started my journey in cyber security. Some old, some new. I hope you find it of use. NOTE: Some links may be broken ...

Back to Top ↑

certifications

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

ETBD/OSEP Review

3 minute read

Shortly after passing OSWE, I began the course work for Evasion Techniques and Breaching Defenses which is another one of Offsec’s OSCE3 certifications. In...

AWAE/OSWE Review

3 minute read

After a bit of a hiatus from studying for certifications, I became interested in the new certification bundle by Offensive Security. The new OSCE3 is obtai...

CTP/OSCE Review

3 minute read

Let me start by thanking my wife for putting up with my obsession with all these cyber shenanigans. She has been with me since before I was working my firs...

Back to Top ↑

offsec

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

ETBD/OSEP Review

3 minute read

Shortly after passing OSWE, I began the course work for Evasion Techniques and Breaching Defenses which is another one of Offsec’s OSCE3 certifications. In...

AWAE/OSWE Review

3 minute read

After a bit of a hiatus from studying for certifications, I became interested in the new certification bundle by Offensive Security. The new OSCE3 is obtai...

CTP/OSCE Review

3 minute read

Let me start by thanking my wife for putting up with my obsession with all these cyber shenanigans. She has been with me since before I was working my firs...

Back to Top ↑

malware analysis

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Windows PE Malware Analysis Part III

11 minute read

Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...

Windows PE Malware Analysis Part II

12 minute read

Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...

Windows PE Malware Analysis Part I

10 minute read

Introduction In this article I will be examining a Windows executable malware specimen. Based on a couple reports from automated malware sandboxes, the spec...

Back to Top ↑

linux

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Windows PE Malware Analysis Part III

11 minute read

Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...

Windows PE Malware Analysis Part II

12 minute read

Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...

Windows PE Malware Analysis Part I

10 minute read

Introduction In this article I will be examining a Windows executable malware specimen. Based on a couple reports from automated malware sandboxes, the spec...

Back to Top ↑

flarevm

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Windows PE Malware Analysis Part III

11 minute read

Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...

Windows PE Malware Analysis Part II

12 minute read

Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...

Back to Top ↑

static analysis

Windows PE Malware Analysis Part II

12 minute read

Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...

Windows PE Malware Analysis Part I

10 minute read

Introduction In this article I will be examining a Windows executable malware specimen. Based on a couple reports from automated malware sandboxes, the spec...

Back to Top ↑

IDA pro

Windows PE Malware Analysis Part III

11 minute read

Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...

Windows PE Malware Analysis Part II

12 minute read

Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...

Back to Top ↑

remnux

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Windows PE Malware Analysis Part III

11 minute read

Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...

Back to Top ↑

osce

CTP/OSCE Review

3 minute read

Let me start by thanking my wife for putting up with my obsession with all these cyber shenanigans. She has been with me since before I was working my firs...

Back to Top ↑

resources

Cyber Bookmarks

2 minute read

A list of bookmarks I have used since I started my journey in cyber security. Some old, some new. I hope you find it of use. NOTE: Some links may be broken ...

Back to Top ↑

cyber

Cyber Bookmarks

2 minute read

A list of bookmarks I have used since I started my journey in cyber security. Some old, some new. I hope you find it of use. NOTE: Some links may be broken ...

Back to Top ↑

penetration testing

Cyber Bookmarks

2 minute read

A list of bookmarks I have used since I started my journey in cyber security. Some old, some new. I hope you find it of use. NOTE: Some links may be broken ...

Back to Top ↑

help

Cyber Bookmarks

2 minute read

A list of bookmarks I have used since I started my journey in cyber security. Some old, some new. I hope you find it of use. NOTE: Some links may be broken ...

Back to Top ↑

web application

AWAE/OSWE Review

3 minute read

After a bit of a hiatus from studying for certifications, I became interested in the new certification bundle by Offensive Security. The new OSCE3 is obtai...

Back to Top ↑

oswe

AWAE/OSWE Review

3 minute read

After a bit of a hiatus from studying for certifications, I became interested in the new certification bundle by Offensive Security. The new OSCE3 is obtai...

Back to Top ↑

Active Directory

ETBD/OSEP Review

3 minute read

Shortly after passing OSWE, I began the course work for Evasion Techniques and Breaching Defenses which is another one of Offsec’s OSCE3 certifications. In...

Back to Top ↑

osep

ETBD/OSEP Review

3 minute read

Shortly after passing OSWE, I began the course work for Evasion Techniques and Breaching Defenses which is another one of Offsec’s OSCE3 certifications. In...

Back to Top ↑

antivirus

ETBD/OSEP Review

3 minute read

Shortly after passing OSWE, I began the course work for Evasion Techniques and Breaching Defenses which is another one of Offsec’s OSCE3 certifications. In...

Back to Top ↑

bypasses

ETBD/OSEP Review

3 minute read

Shortly after passing OSWE, I began the course work for Evasion Techniques and Breaching Defenses which is another one of Offsec’s OSCE3 certifications. In...

Back to Top ↑

osed

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

windbg

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

ida pro

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

rop chains

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

SEH overflows

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

stack overflows

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

dep bypass

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

aslr bypass

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

egghunters

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

shellcoding

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

assembly

WUMED/OSED Review and Obtaining OSCE3

5 minute read

In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certificati...

Back to Top ↑

FLOSS

Windows PE Malware Analysis Part II

12 minute read

Overview In Part I we conducted static analysis using basic tools and techniques on a malicious Windows portable executable and came up with several findings...

Back to Top ↑

dynamic analysis

Windows PE Malware Analysis Part III

11 minute read

Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...

Back to Top ↑

x32dbg

Windows PE Malware Analysis Part III

11 minute read

Overview In Part II we concluded our static analysis by becoming familiar with IDA Pro and using it to confirm one of our previous findings and to examine ob...

Back to Top ↑

behavioral analysis

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Back to Top ↑

windows

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Back to Top ↑

wireshark

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Back to Top ↑

procmon

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Back to Top ↑

regshot

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Back to Top ↑

procdot

Windows PE Malware Analysis Part IV

8 minute read

Overview In Part III we learned how to use x32dbg and performed code analysis on our malicious specimen which uncovered several indicators of compromise. We ...

Back to Top ↑