Traffic Analysis of STRRAT MalwareSource: https://www.malware-traffic-analysis.net/2024/07/30/index.htmlAug 19, 2024Aug 19, 2024
Zero VM Walkthrough on HMVHack My VM (HMV) is an online capture the flag (CTF) platform for developing your hacking skills through CTF challenges. CTFs offer the…Jun 8, 2024Jun 8, 2024
Don’t Take That Bait!For many years now, the primary way hackers compromise the accounts of individuals and businesses has been through one form of social…May 1, 2024May 1, 2024
How I Use Wireshark to Analyze Malicious TrafficWireshark, amongst many other network protocol analyzers, is one of those tools in every IT professional’s toolbox. Its ease of use…Mar 25, 2024Mar 25, 2024
What They Didn’t Tell You About PasswordsWhere was the first time you used a password? I am very sure you can’t remember. For some, the answer would be 20, 15, 10 years ago and for…Feb 16, 2024Feb 16, 2024
My Malware Analysis MethodologyMalware is any program that is written to cause a kind of harm to a person’s computer, or the person in particular by stealing login…Feb 9, 2024Feb 9, 2024