Monday, March 23, 2015
Malware Analysis: The Final Frontier: Data Obfuscation: Now you see me... Now you don't....
Malware Analysis: The Final Frontier: Data Obfuscation: Now you see me... Now you don't....: Introduction This blog post shows how malware authors use Adobe Flash files to hide their creations' ' sensitive ' data. I'...
Saturday, March 21, 2015
Scrutiny from an Inquisitive mind: Defeating EMET 5.2
Scrutiny from an Inquisitive mind: Defeating EMET 5.2: Since my last post, i thought if Malware Bytes Anti Exploit can be bypassed in a targetted attack why not work on bypassing EMET using rop ...
Friday, March 20, 2015
Dynamoo's Blog: Something evil on 85.143.216.102 and 94.242.205.10...
Dynamoo's Blog: Something evil on 85.143.216.102 and 94.242.205.10...: I will confess that I don't have much information on what this apparent exploit kit is or how it works, but there seems to be somethin...
Thursday, March 19, 2015
Dynamoo's Blog: Malware spam: "sales@marflow.co.uk" / "Your Sales ...
Dynamoo's Blog: Malware spam: "sales@marflow.co.uk" / "Your Sales ...: This spam run pretends to come from Marflow Engineering but it doesn't, instead it is a simple forgery. Marflow are not sending out t...
Wednesday, March 18, 2015
Jump ESP, jump!: Thousand ways to backdoor a Windows domain (forest...
Jump ESP, jump!: Thousand ways to backdoor a Windows domain (forest...: When the Kerberos elevation of privilege (CVE-2014-6324 / MS14-068) vulnerability has been made public, the remediation paragraph of follo...
Subscribe to:
Posts (Atom)