Reversing Malware Command and Control: From Sockets to COM
August 16 2010On a Windows host there is more than one way for a program to communicate across the internet. When reverse engineering a piece ...
Read moreOn a Windows host there is more than one way for a program to communicate across the internet. When reverse engineering a piece ...
Read moreFor an attacker to maintain a foothold inside your network they will typically install a piece of backdoor malware on at least one ...
Read moreSteve Davis and I gave a talk at Blackhat and at Defcon called Metasploit Autopsy: Reconstructing the scene of the...
Read moreSteve Davis and I gave a talk at Blackhat and at Defcon called Metasploit Autopsy: Reconstructing the scene of the...
Read moreSteve Davis and I gave a talk at Blackhat and at Defcon called Metasploit Autopsy: Reconstructing the scene of the...
Read moreSteve Davis and I gave a talk at Blackhat and at Defcon called Metasploit Autopsy: Reconstructing the scene of the...
Read moreIf you are tired of trying to load Memoryze's results into Internet Explorer or into an Excel spreadsheet, check out the new viewer from Peter Silberman. The Audit Viewer...
Read moreIf you are tired of trying to load Memoryze's results into Internet Explorer or into an Excel spreadsheet, check out the new viewer from Peter Silberman. The Audit Viewer...
Read moreIf you are tired of trying to load Memoryze's results into Internet Explorer or into an Excel spreadsheet, check out the new viewer from Peter Silberman. The Audit Viewer...
Read moreIf you are tired of trying to load Memoryze's results into Internet Explorer or into an Excel spreadsheet, check out the new viewer from Peter Silberman. The Audit Viewer...
Read more
Recent Comments