A Malware Researcher’s Guide to Reversing Maze Ransomware

A Malware Researcher’s Guide to Reversing Maze Ransomware

At the end of May 2019, a new family of ransomware called Maze emerged into the gaping void left by the demise of the GandCrab ransomware. Unlike run-of-the-mill commercial ransomware, Maze authors ...

Video: All Things CTF!

Find Fame, Fortune and Fun with CTFs! Video and Slide Deck from EH-Net Live! November 2019 Games are fun. They’re meant to be that way. Games can also teach us valuable lessons ...

Webinar: All Things CTF!

Register Now to Find Fame, Fortune and Fun with CTFs! Capture the Flag is a game that can teach valuable lessons in teamwork, strategy, agility and endurance. The equivalent in the hacking ...
Image Credit: Paul Scherrer Institute - Ptychographic X-ray Laminography

Reverse Engineering Intellectual Property: Chip Ptychographic X-ray Laminography

Image Credit: Paul Scherrer Institute - Ptychographic X-ray Laminography via Samuel K. Moore - writing for IEEE Spectrum Magazine - comes this outstanding article published on October 7th, 2019; in which, Mr ...
EH-Net - Book Review - Malware Data Science - Neural Net Learning

Book Review: Malware Data Science

“Malware Data Science: Attack Detection and Attribution” (MDS) is a book every information security professional should consider reading due to the rapid growth and variation of malware and the increasing reliance upon ...

Crack Me Challenge Part 4

First we must take a look at the following piece of code that will be presented in the code segment 5: 004017FC |. B8 40000000 mov eax,40 00401801 |. 33C9 xor ecx,ecx ...
Reversing malware in a custom format: Hidden Bee elements

Reversing malware in a custom format: Hidden Bee elements

When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable ...

How InfoSec Institute Alum Val Vask Stays Current on Pentesting & SCADA Standards

Val Vask is the Commercial Technical Lead at Bridges Consulting, a Maryland-based cybersecurity firm specializing in national security and commercial vulnerability challenges. Before starting work at... Go on to the site to ...
PHDays 8: EtherHack Contest Writeup

PHDays 8: EtherHack Contest Writeup

This year at PHDays security conference a new contest called EtherHack was held. The goal was to be the first to solve all tasks which featured smart contract vulnerabilities. Here we present ...