![]() It contains statistics and best practices.Ī crackme which offers the opportunity to show how to reverse engineer protected Android applications with Profiler. The paper tries to increase the awareness of end users. ![]() Risikofaktoren bei verschiedenen Dateitypen (German)Īn easy-to-read overview (in German) of the main risks associated to different file types. At the time of writing, all security solutions were tricked by this technique. ![]() The gained knowledge is then used to write a small utility in under 300 lines of Python code to recover deleted files.ĭisclosure: Creating undetected malware for OS XĪ proof-of-concept which demonstrates how to create undetected malware on OS X by using the internal mechanism called Apple Binary Protection. This article shows how to perform raw analysis of a file system by using C types imported from source headers. Raw File System Analysis (FAT32 File Recovery) The article includes the analysis of the shellcode and of the payload. The article shows how to analyze the various stages and completely deobfuscate the JavaScript code.Īn in-depth analysis of a malware using XDP embedded in a PDF and anti-analysis tricks.Īn in-depth analysis of a malware using XDP with JavaScript embedded in a PDF document.Īn in-depth analysis of an office document which uses a TIFF vulnerability to execute shellcode. InQuest: Cerbero Suite: The Hacker’s MultitoolĪnalysis of a multi-stage Microsoft Office malware containing VBE, CAB and heavily obfuscated JSE. You can find the script code mentioned in the video on our blog.Īn introduction to the formula view which in conjunction with our Silicon Excel Emulator is used to analyze an obfuscated Excel (XLSX) malware in just 50 seconds. You can find the script code for the first sample and the second sample on our blog.Ī more advanced Excel malware which uses a time-based value to decrypt its own formulas. In this video-series various samples of malicious Excel vectors belonging to the QakBot malware are analyzed. QakBot Excel Malware Analysis Series ( 2nd sample, 3rd sample) You can find the script code on our blog.Ī first introduction to our Silicon Excel Emulator and how to analyze malicious Excel documents. As a bonus, in the video we show how to improve the static analysis of the final payload by resolving API calls. ![]() You can find the original analysis for this malware on malwarebytes. Malicious Windows Link with Embedded Microsoft Cabinet Analysis ![]() Series editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland e-mail: Ībout this Series The series “Studies in Computational Intelligence” (SCI) publishes new developments and advances in the various areas of computational intelligence-quickly and with a high quality.You can find the scripts used to analyze this malware on our blog. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Alsmadi Department of Computing and Cyber Security University of Texas A&M San Antonio, TX, USA Of particular value to both the contributors and the readership are the short publication timeframe and the worldwide distribution, which enable both wide and rapid dissemination of research output.Įditors Izzat M. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |