Shaquib IzharHow I gained initial access using Social EngineeringCybercriminals have done a lot of damage to organization through Social Engineer Attack, from FireEye to Cisco & recently Uber they all…Oct 9, 2022Oct 9, 2022
Shaquib IzharFileless Binary Analysis with Cuckoo sandboxWhat is cuckoo SandboxJul 10, 2022Jul 10, 2022
Shaquib IzharExtracting digital evidence using memory imaging and bulk extractorIn this quick post we are going to extract juicy info from a raw memory image. This method can be helpful to find digital evidence from…Apr 12, 2022Apr 12, 2022
Shaquib IzharPwning with shortcut : Abusing windows lnk feature to get footholdIn windows lnk is an extension of shortcut files. Windows create a shortcut which points to an actual file and run that application. In…Feb 17, 2022Feb 17, 2022
Shaquib IzharAn Intro to Pagefile ForensicIn this brief write-up, we will explore page files and how page file forensics can assist investigators in obtaining digital evidence from…Nov 28, 2021Nov 28, 2021
Shaquib IzharDigital investigation of malicious backdoor PDFIn this post we are going to investigate a malicious PDF file , as we all know a PDF file can be infected with embedded objects,JavaScript…Apr 1, 2021Apr 1, 2021
Shaquib IzharParent process spoofing and how to detect themMalware uses vaious techniques to hide it or evade from antivirus or EDR system. So I decided to discuss about a very intresting malware…Aug 20, 2020Aug 20, 2020
Shaquib IzharTesting capa the Malware analysis toolRecently FireEye has released open-source malware analysis tool capa. It became very popular among malware analysts because of its ability…Aug 14, 2020Aug 14, 2020
Shaquib IzharHow hundreds of websites are exposing their sensitive data and risking their user’s privacyThe Purpose of this article is to show how some websites are exposing their sensitive data and risking their user’s privacy.Aug 7, 2020Aug 7, 2020