Ethical hacking: Basic malware analysis tools

Introduction to malware analysis Malware analysis is a common component in the incident response process. Once malware has been identified on a system, it is often useful to investigate and learn... Go on to the site to read the full article ... Read More

Ethical hacking: Breaking cryptography (for hackers)

Introduction Cryptography is the science of protecting secrets. As a result, it’s designed to make it impossible for an unauthorized party (like a hacker) to gain access to the protected data. While... Go on to the site to read the full article ... Read More

MITRE ATT&CK vulnerability spotlight: Access token manipulation

| | General Security
Introduction MITRE is a U.S. government federally-funded research and development center (FFRDC) which performs a large amount of research and assessment as a trusted third party for the government.... Go on to the site to read the full article ... Read More

Ethical hacking: Buffer overflow

| | Buffer Overflow
Introduction to buffer overflows When taking external input, an application needs to allocate memory to store that input. Many high-level programming languages will do this behind the scenes, but... Go on to the site to read the full article ... Read More

Top 5 Remote Access Trojans

Introduction to RATs Once a hacker has gained initial access to a target machine, expanding and solidifying that foothold is the next logical step. In the case of a phishing attack, this involves... Go on to the site to read the full article ... Read More

Cryptography fundamentals for hackers

What is cryptography? Cryptography literally means “secret writing.” It’s the science of protecting sensitive data from being read (or modified) by unauthorized parties such as eavesdroppers,... Go on to the site to read the full article ... Read More

Covering tracks — Hiding files on Windows/Linux/MacOS

| | Covering Tracks
Introduction to hiding files After gaining access to a system, a hacker commonly needs to cover their tracks in order to avoid detection. Many antiviruses operate by searching through the list of... Go on to the site to read the full article ... Read More

Top 10 network recon tools

| | Network Recon
Introduction: The need for recon Reconnaissance is an important first stage in any ethical hacking attempt. Before it’s possible to exploit a vulnerability in the target system, it’s necessary to... Go on to the site to read the full article ... Read More

Lessons learned: The Marriott breach

| | General Security
Overview of the breach Marriott International has been in the news throughout 2019 due to a major data breach discovered and investigated in late 2018. The data breach, which leaked 383 million... Go on to the site to read the full article ... Read More

MITRE ATT&CK vulnerability spotlight: Valid accounts

| | General Security
Introduction The MITRE Corporation is a non-profit, federally-funded research and development center (FFRDC) that, among other things, performs cybersecurity research and development. One of the... Go on to the site to read the full article ... Read More