Analysis of Malicious Documents- Part 5

Analysis of Malicious Documents- Part 5

| | Hacking
In the last article, we reviewed how to analyze malicious PDF documents. In this last part of the article series, we will continue analyzing PDF documents with other tools. In this article, review... Go on to the site to read the full article ... Read More
DEFENDER: WordPress Plugin Evaluation

DEFENDER: WordPress Plugin Evaluation

| | Application Security
Introduction In this article, we will look at the DEFENDER WordPress plugin. This plugin is touted to provide layered security for WordPress sites/blogs. This plugin is available in the plugins store... Go on to the site to read the full article ... Read More
Microsoft Office Dynamic Data Exchange(DDE) attacks

Microsoft Office Dynamic Data Exchange(DDE) attacks

| | Hacking
Microsoft Office programs are widely exploited by malware authors by embedding links, objects, and other payloads. Its effects often depend on how the user will interact with documents. Customarily... Go on to the site to read the full article ... Read More
Analysis of Malicious Document 4

Analysis of Malicious Document 4

| | Malware Analysis
In the last part of this article series, we have seen the structure of PDF document and all the essential keywords which can be used by analysts to carry investigations and are also used by various... Go on to the site to read the full article ... Read More
Analysis of Malicious Documents-Part 3

Analysis of Malicious Documents-Part 3

| | Malware, Malware Analysis
In the last part of the article series, we have seen some handy options of OfficeMalScanner like debug, scan, brute, etc.; learned about structures streams, etc. In this part of the article, we will... Go on to the site to read the full article ... Read More
Analysis of Malicious Documents-Part 2

Analysis of Malicious Documents-Part 2

| | Malware, Malware Analysis
In the previous part of this article series, we have seen some basics and initial concepts around analyzing Malicious files. In this part of article series, we will consider more complex examples and... Go on to the site to read the full article ... Read More
Analysis of Malicious Documents-Part 1

Analysis of Malicious Documents-Part 1

| | Malware, Malware Analysis
Spreading of malware through malicious documents is not new but considering how malware authors use different techniques has become challenging for malware analysts to identify the patterns, extract,... Go on to the site to read the full article ... Read More
Kernel Exploitation-Part 3

Kernel Exploitation-Part 3

| | Hacking
Over the last two articles of this series, we have come a long way around kernel exploitation. We started with finding a buffer overflow in driver code to parsing of different structures to steal the... Go on to the site to read the full article ... Read More
Windows Kernel Exploitation- Part 1

Windows Kernel Exploitation- Part 1

| | Hacking, Threats & Breaches
In this article series, we will learn about kernel exploitation using a driver HackSysExtremeVulnerableDriver built by Ashfaq Ansari. The driver has many vulnerabilities built into it, and we will... Go on to the site to read the full article ... Read More
Kernel Exploitation-Part 2

Kernel Exploitation-Part 2

| | Exploit Development
In Part-1 of this article series, we had reverse engineered the driver and identified buffer overflow vulnerability in it. In this part, we will cover the next step of developing the exploit, and for... Go on to the site to read the full article ... Read More