Android Malware Analysis – DroidDream

All the malware analysis related articles on my blog so far have been PE malware. But malware isn't restricted to Windows OS. There are malware for Linux, macOS, IoT-related OSes, etc. In this article, I'll break down an Android malware called DroidDream which was infamous back in 2011. It affected Android versions before 2.3 (Gingerbread).... Continue Reading →

Advertisements

Pentesting – VulnHub: DC-4

In the last article, we rooted a VulnHub machine - DC-2. I wanted to write about DC-3 next, but for some weird reason its NIC was not coming up. So, I'm skipping DC-3 and moving on to the next machine in the series - DC-4. The machine is available here. Note: The methodologies and tools... Continue Reading →

Pentesting – VulnHub: DC-2

In the last article, we rooted a VulnHub machine - DC-1. Moving on to the next machine in the series, we're going to look at DC-2. The machine is available here. Note: The methodologies and tools that you learn from pentesting are real. Do NOT attempt to try and hack into machines you’re not authorized... Continue Reading →

Pentesting – VulnHub: DC-1

This post is one of the many that I'll be writing on basic pentesting. VulnHub is a fantastic starting point for those who are beginners to pentesting and as such, all the machines that we'll be hacking into are available as .ova downloads on VulnHub. I usually always import them into VMware Workstation, just because I'm... Continue Reading →

String Deobfuscation using SMT Solver

Most malware authors employ string obfuscation techniques to hide important strings from malware analysts. Usually, my approach to deobfuscating these strings would be to either execute the malware sample under a debugger or codify the decoding scheme in a high-level language like Python. These methods work well. Even if the malware employs anti-debugging techniques, they... Continue Reading →

Powered by WordPress.com.

Up ↑

Create your website at WordPress.com
Get started