-
Feb 28, 2018
Network printers use a various amount of protocols and firmwares which differ from vendor to vendor and model to model. Obviously, every firmware (and protocol) could be vulnerable and exploitable but, a printer could be an attack vector? Why would… read more »
-
Feb 26, 2018
Since 2014, the use of containers started making a big growth in IT, and especially in devops. The benefits are undeniable: flexibility and go-live times, small size of deployement images, task specific and reproducible containers. However when using a container… read more »
-
Feb 23, 2018
Scales are a valuable tool to improve the coordination between both hands and develop a fluent phrasing. Speed, sound, accuracy, articulation, dynamics these are all techniques that can be worked on with scales. In my opinion, the right hand should… read more »
-
Feb 21, 2018
In some occasions you need to acquire an image of a computer using a boot disk and network connectivity. Usually, this approach is made with a Linux boot disk on the machine under analysis, and another computer used as imaging… read more »
-
Feb 19, 2018
Dynamic and static malware analysis using a lot of preconfigured environments. ANY.RUN is an interactive online malware analysis service that allows both dynamic and static research using environments based on all Windows version from XP to 10, 32 and 64… read more »
-
Feb 16, 2018
Every analyst, during day by day experiences refines its own workflow for timeline creation. Today i propose mine. Required tools Sleutkit Sleuth Kit is a collection of command line tools that allows you to analyze disk images. https://www.sleuthkit.org/sleuthkit/ Volatility The… read more »
-
Feb 14, 2018
Do you think that protect your Excel worksheet with password is safe? You are wrong! Starting with Office 2007, Excel files use the Open Office XML File Format. It’s an open standard, really well documented: http://www.ecma-international.org/publications/standards/Ecma-376.htm Each Excel workbook contains… read more »
-
Feb 12, 2018
Malware authors have always looked for new techniques to stay invisible. This includes being invisible on the compromised machine, but it is even more important to hide malicious indicators and behavior during analysis. Malware authors attempt to utilize techniques to… read more »