Posts
~/FareedFauzi
Cancel

I’ve test some fileless command in my lab with AV Protection (Most of them are free/trial version) and here’s the result. Symbol Description ✔️ Blo...

In this post, we’ll learn together how to write a basic malware program that does a reverse shell connection (using shellcode) and analyze our own compiled malware. We’ll play around with C code us...

I came across a fileless malware called Lemon-Duck crypto miner during our (my officemate and I) investigation on suspicious communication in our client network. This malware completely leveraging ...

RTF RTF often comes with exploits targetting Microsoft Word vulnerabilities. Always look for embedded objects and anomalous content in the RTF. Be prepared to locate, extract and analyze shellcod...

PowerShell attacks are currently the popular weapon of alternative for several of those attacks as a result of it provides variety of techniques for bypassing existing security. Not least of all, t...