-
Dec 23, 2016
My own shortlist One of the first steps that you need to perform when you deal with the forensic analysis of a compromised machine is to make a copy of volatile memory. This copy will be used for in-depth analysis… read more »
-
Dec 22, 2016
“If you are hired as a penetration tester for some company and they forgot to tell you that they are using web application firewall than you might get into a serious mess.” Interesting article published by Usman Nasir on KaliTutorials: using… read more »
-
Dec 21, 2016
An interesting video lesson by Bradford Werner In this video, Bradford Werner talks about the right hand thumb position and the related exercises. [embed]https://www.youtube.com/watch?v=BpU1zYKp404[/embed] When adjusting your hand and thumb position remember to also consider your guitar position, footstool height, and… read more »
-
Dec 20, 2016
Powerful and easy to use PowerShellArsenal is a useful PowerShell module that can be used to perform reverse engineering activities on .NET assemblies, like disassembling code, perform .NET malware analysis and analyze memory. PowerShellArsenal is comprised of the following tools: Disassembly — Disassemble native and… read more »
-
Dec 19, 2016
DNSChanger is back! DNSChanger is a malware that infected millions of computers across the world in 2012 and that works by changing DNS server entries in infected computers to point to malicious servers under the control of the attackers, rather than… read more »
-
Dec 19, 2016
Your site has been hacked? Be careful, it might contain a backdoor! BackdoorMan is a python script useful to discover malicious scripts in PHP sites: is quite common for attackers to place a back-door on a site they have violated… read more »
-
Dec 18, 2016
Free virtual machines, documentation and challenges! Exploit-exercises.com provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering,… read more »
-
Dec 16, 2016
A really inspiring video A short video published by TheGuardian shows the morning routine of a legend of the ultramarathon, Scott Jurek: What ingredients are required to make an ultramarathon runner? In Boulder, Colorado, Scott Jurek has concocted quite the… read more »