Home

Cheatsheet: Linux Forensics Analysis

Linux Forensic in a nutshell: Validate compromised Interviewing client/user/administrator (what, why, how, when, where, who?) Live response commands / Run triage scripts Collect evidence Live response triage script collection Disk image Memory dump Investigation and analysis ...

Read more

Cheatsheet: Windows Forensics Analysis

During a Windows Forensics engagement, I occasionally find myself forgetting essential tasks or unintentionally skipping analyzing importants artifacts. Therefore, this checklist (along with cheatsheet) could help myself (or readers) and ensure that I adhere to a systematic workflow when conducting Windows Forensics. Typical Forensic investigat...

Read more

Yet another Malicious Android Apps targeting Malaysian

In this post, we will be discussing a disturbing new trend in malicious Android apps that have been targeting users in Malaysia. These apps, which have been disguised as legitimate services such as Cleaning service, have been found to contain SMS stealer and banking credential phishing capabilities, putting the sensitive information of their vic...

Read more

Building Offensive Malicious Documents

Generally, the attacker will use the below techniques in leveraging Microsoft Office features and vulnerabilities: Exploits Macros Remote template injection and many more… In this post, we will learn various techniques on how to make malicious documents that can execute our malicious code. Of course, to make it simple we will just run ...

Read more

UPX manual unpack: ELF and EXE

Introduction Recently, I’ve come across a Golang malware sample which have been packed by UPX. The sample was made to be cannot be unpack using UPX tool. So, I thinks it’s good to write a blog/note to explain how the UPX manually unpacking works. UPX tool doesn’t work In the figure below, there are certain situation when the malware author make...

Read more

Malware 101: Develop and Analyze our own malware

In this post, we’ll learn together how to write a basic malware program that does a reverse shell connection (using shellcode) and analyze our own compiled malware. We’ll play around with C code using Visual Studio IDE and MSVenom for the creation of the shellcode. The maldev and malware reversing is only for education purpose only! Malware dev...

Read more

Powershell 101 in Malware Analysis

PowerShell attacks are currently the popular weapon of alternative for several of those attacks as a result of it provides variety of techniques for bypassing existing security. Not least of all, the flexibility to run directly in memory and remotely download payloads gave a lot of benefits to attacker. Let’s learn a little bit about Powershell...

Read more