Malware Analysis 101
What is Malware Analysis? Malware analysis is the study of the unique features, objectives, sources, and potential effects of harmful software and code, such as spyware, viruses, malvertising, and ...
What is Malware Analysis? Malware analysis is the study of the unique features, objectives, sources, and potential effects of harmful software and code, such as spyware, viruses, malvertising, and ...
What is JS? Javascript is a client side object oriented scripting language. Authors of JavaScript scripts use a variety of techniques to obfuscate the scripts. For example, they can use confusing s...
Whodunit Tool Whodunit is a tool that can be used to identify the most likely Advanced Persistent Threat (APT) group responsible for an attack. The tool ingests a cyber security report that cont...
Threat Intelligence Cyber threat intelligence results from disparate cyber threat data collected, processed, and analyzed to provide insights into cybercriminals’ motives, targets, and methodologi...
ffuf - Fuzz Faster U Fool ffuf tool which use to do fuzzing/brute force attacks Usage: ffuf [flags] Flags: -w Wordlist file path -u Target URL -H Custom...
Windows Core Process Download the SANS DFIR Overview From SANS system.exe The System process is responsible for most kernel-mode threads. Modules run under System are primarily drivers (.sys...
NFS First, the client will request to mount a directory from a remote host on a local directory just the same way it can mount a physical device. The mount service will then act to connect to the...
FTP File Transfer Protocol (FTP) is, as the name suggests , a protocol used to allow remote transfer of files over a network. It uses a client-server model to do this, and- as we’ll come on to late...
SQL In its simplest definition, MySQL is a relational database management system (RDBMS) based on Structured Query Language (SQL). Too many acronyms? Let’s break it down: Database: A database is s...
SMTP MTP stands for “Simple Mail Transfer Protocol”. It is utilised to handle the sending of emails. In order to support email services, a protocol pair is required, comprising of SMTP and POP/IMAP...