czwartek, 30 kwietnia 2020

Reading malware - orbitclient.x86

After reading last cases of malwares found online I decided that I will check one more again. ;) Below you will find few notes about it. Here we go...

Reading malware - yakuza.x86

After reading SNOOPY I decided to check one more sample available here. This time I found malware called yakuza.x86. Let's try to understand what this code can do. Below few notes. Here we go...

Reading malware - SNOOPY

Yesterday I had a chance to check few of the 'new malware samples' available here. Below you'll find few notes about it. Here we go...

CrackMe for Beginners

I decided to create a „CrackMe for Beginners” paper to prepare some basic ideas and hints for new reversers. After a while there were a few 'papers' related to the subcjet so I decided to publish it on the blog. Below you will find the details. Here we go...

wtorek, 21 kwietnia 2020

Quick malware analysis

In the meantime I decided to look for some 'new malware' to check in my VM lab. After few minutes I found one sample dropped today just few hours ago. Let's see what I found. Here we go...

poniedziałek, 20 kwietnia 2020

No python, no problem

Sometimes during our pentests we are facing the situation when we can not bring our own laptop with the whole great set of tools installed and prepared. We can only 'pentest' the target (box/app/scope) from the machine prepared by the Client. It can be annoying when you can't use tools like nmap or netcat but we'll try to fix that. Here we go...

piątek, 3 kwietnia 2020

Postauth SQLi in Centreon 19.10-1.el7

I saw that you liked the little series about Centreon bugs[1, 2] so below I prepared a new post for the SQL injection found in latest version (centreon-vbox-vm-19.10-1.el7). Here we go...

Crashing VMPlayer 14

Since last few weeks I'm looking for some fresh and new OVA/ISO images I can install and pentest at home. Two days ago I found another one image. Results you'll find below. Here we go...