Digital forensics

Data Exfiltration Techniques

Introduction In this article we will see how malware encode or encrypt data that's exfiltrated to the Command and Control Server from infected machines. Thi

Linux and disk forensics

A digital forensic investigation generally consists of five major steps [Figure-1]: Identification Data Acquisition Data Recovery Analysis R

Data Exfiltration Techniques

Introduction In this article we will see how malware encode or encrypt data that's exfiltrated to the Command and Control Server from infected machines. Thi

Vulnerability Assessment of SNMP Service – II

Background: This is our second article in a series on vulnerability assessment of SNMP Service. In the previous article, we learned how we could set up a SN

Anatomy of a VB Virus

Introduction In this article, we will look in depth at a virus written in Visual Basic. We look at various techniques used by this virus to deter the process

Vulnerability Assessment of SNMP Service – I

Background: This is the first article out of a series of articles that I am planning to write on vulnerability assessment of SNMP Service. SNMP – also known

Portable Malware Lab for Beginners

With the ever increasing cases of malware, many of the youngsters are switching over to analyzing malwares and its various aspects. A simple search in Google

Cyber Weapon of Mass Destruction- The Blackhole Exploit Kit

Recent security advisories reveal that the web exploit kits like the Blackhole Exploit Kit are responsible for the vast majority of web attacks and malware i

Android Forensics

The article tries to cover various Android forensic techniques that can be helpful in a variety of situations. The techniques or discussions below can be eit

.NET Framework CLR: Common Language Runtime

Introduction The point of this article is to lay down the conceptual groundwork of numerous .NET related topics such as CLR, CTS, CLS, Managed Code, JIT Comp