Menu

Close
  • Home
  • Projects
  • Echoes Encrypted IM
  • @waydrian
Subscribe
{ bit.therapy } Menu

{ bit.therapy }

. . .

Scroll Down
Page 1 of 5 Older Posts →

Malicious Document Analysis – Macro to Shellcode

I came across an interesting Word document which at first glance definitely looked malicious. It had everything from random variable names to lyrics from Garbage - »

waydrian on Malware, Debugging, Reverse Engineering, Malware Analysis, IDA Pro, hancitor, chanitor, OllyDbg 25 November 2016 Comments

Analyzing Obfuscated SWFs

A few days ago I was alerted of a host communicating with a (bad) domain and downloading SWF files. There was some concern that there was »

waydrian on Malware, Malware Analysis, Flash, SWF, Reverse Engineering 09 October 2016 Comments

IceCTF: Analyzing PCAPs and reversing encryption

IceCTF started a little while a go and we got a team together to try and grab some of these flags. If you're doing the challenges »

waydrian on Reverse Engineering, Forensics, CTF, Cryptography 20 August 2016 Comments

A look at Zepto Ransomware - Payload delivery analysis

It's another quiet Friday when we are alerted of bunch of files with the .zepto extension being created all over the place. It seems that a »

waydrian on Malware, Reverse Engineering, Malware Analysis, Zepto, Ransomware 16 August 2016 Comments

Creating your own US Netflix proxy with Google Cloud

Say you wanted to create your own Unblock-Us or Tunlr service... maybe for educational purposes or maybe because Netflix is starting to block access from VPN »

waydrian on Netflix, Google Cloud, GCE, Google Compute Engine, Tunlr, Unblock-Us, SNI-Proxy, Cord-cutting, American Netflix 03 February 2016 Comments
Page 1 of 5 Older Posts →
{ bit.therapy } © 2018
Proudly published with Ghost