Professionally Evil Fundamentals: Introduction

Solving the November 13th Detective Nevil Mystery Challenge

Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”.  On November 13th of 2020, we released a challenge that contained a payload and it ...
Not-So-Random: LD_PRELOAD to Hijack the rand() Function to Control The Generation of Random Numbers

Not-So-Random: Using LD_PRELOAD to Hijack the rand() Function

    Today I wanted to continue the series on using LD_PRELOAD.  In today’s post we are going to use LD_PRELOAD to hijack the rand() function in a simple random number guessing game to ...
Professionally Evil Fundamentals: Introduction

LD_PRELOAD – Introduction

    Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is related to Linux based systems and revolves around the loader system and ...
A Malware Researcher’s Guide to Reversing Maze Ransomware

A Malware Researcher’s Guide to Reversing Maze Ransomware

At the end of May 2019, a new family of ransomware called Maze emerged into the gaping void left by the demise of the GandCrab ransomware. Unlike run-of-the-mill commercial ransomware, Maze authors ...

Video: All Things CTF!

Find Fame, Fortune and Fun with CTFs! Video and Slide Deck from EH-Net Live! November 2019 Games are fun. They’re meant to be that way. Games can also teach us valuable lessons ...

Webinar: All Things CTF!

Register Now to Find Fame, Fortune and Fun with CTFs! Capture the Flag is a game that can teach valuable lessons in teamwork, strategy, agility and endurance. The equivalent in the hacking ...
Image Credit: Paul Scherrer Institute - Ptychographic X-ray Laminography

Reverse Engineering Intellectual Property: Chip Ptychographic X-ray Laminography

Image Credit: Paul Scherrer Institute - Ptychographic X-ray Laminography via Samuel K. Moore - writing for IEEE Spectrum Magazine - comes this outstanding article published on October 7th, 2019; in which, Mr ...
EH-Net - Book Review - Malware Data Science - Neural Net Learning

Book Review: Malware Data Science

“Malware Data Science: Attack Detection and Attribution” (MDS) is a book every information security professional should consider reading due to the rapid growth and variation of malware and the increasing reliance upon ...

Crack Me Challenge Part 4

First we must take a look at the following piece of code that will be presented in the code segment 5: 004017FC |. B8 40000000 mov eax,40 00401801 |. 33C9 xor ecx,ecx ...
Reversing malware in a custom format: Hidden Bee elements

Reversing malware in a custom format: Hidden Bee elements

When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable ...