How I gained initial access using Social EngineeringCybercriminals have done a lot of damage to organization through Social Engineer Attack, from FireEye to Cisco & recently Uber they all…Oct 9, 2022Oct 9, 2022
Extracting digital evidence using memory imaging and bulk extractorIn this quick post we are going to extract juicy info from a raw memory image. This method can be helpful to find digital evidence from…Apr 12, 2022Apr 12, 2022
Pwning with shortcut : Abusing windows lnk feature to get footholdIn windows lnk is an extension of shortcut files. Windows create a shortcut which points to an actual file and run that application. In…Feb 17, 2022Feb 17, 2022
An Intro to Pagefile ForensicIn this brief write-up, we will explore page files and how page file forensics can assist investigators in obtaining digital evidence from…Nov 28, 2021Nov 28, 2021
Digital investigation of malicious backdoor PDFIn this post we are going to investigate a malicious PDF file , as we all know a PDF file can be infected with embedded objects,JavaScript…Apr 1, 2021Apr 1, 2021
Parent process spoofing and how to detect themMalware uses vaious techniques to hide it or evade from antivirus or EDR system. So I decided to discuss about a very intresting malware…Aug 20, 2020Aug 20, 2020
Testing capa the Malware analysis toolRecently FireEye has released open-source malware analysis tool capa. It became very popular among malware analysts because of its ability…Aug 14, 2020Aug 14, 2020
How hundreds of websites are exposing their sensitive data and risking their user’s privacyThe Purpose of this article is to show how some websites are exposing their sensitive data and risking their user’s privacy.Aug 7, 2020Aug 7, 2020