Category: cybersecurity

  • How Proxy works

    A proxy server acts as an middle man between a client and a server, facilitating communication between them. Client requests a resource from a server, instead of directly contacting the server, the client sends the request to the proxy server, which forwards the request on behalf of the client to the server. The server then…

  • How Firewall works

    A Firewall is a network security device (physical or virtual) that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of rules[3]. It acts as a barrier between the secured internal and external networks and helps protect against unauthorized access and potential threats. Firewalls…

  • EFLAGS flags

    The different categories of registers in the IA-32 architecture along with examples and explanations of what each register does: These registers play a crucial role in assembly language programming. They are used for various purposes like storing data, managing program flow, accessing memory, and controlling the behavior of the processor. Understanding and efficiently utilizing these…

  • How Stack works

    For a malware analyst, understanding the concept of the heap is crucial when analyzing malicious software and its memory management. The heap is a region of a computer’s memory used for dynamically allocating memory during the execution of a program. Here are some key points to know about the heap: Understanding the heap and its…

  • How Kerberos works

    Kerberos is an authentication protocol that provides secure authentication over an insecure network. It was originally developed by MIT in the 1980s and is named after the mythical three-headed dog, Cerberus[1]. Kerberos authentication involves multiple components working together to verify and authenticate user identities[2][3]: Here’s an overview of how Kerberos authentication works: Throughout the process,…

  • OpcJacker

    Based on the search results, here is a brief summary of OpcJacker: OpcJacker is a malware that has been reported to carry out a variety of malicious activities[1]. It is capable of logging keystrokes, capturing screenshots, stealing sensitive information from web browsers, loading additional modules, and manipulating cryptocurrency addresses in the system clipboard[1]. This malware…

  • ScrubCrypt

    FortiGuard Labs recently discovered a new crypter variant called “ScrubCrypt” that targets vulnerable Oracle WebLogic servers. It is used by the mining group known as 8220 Gang. ScrubCrypt obfuscates and encrypts applications to evade detection. It includes features like anti-debugging, Reflective Injection, and registry manipulation.ScrubCrypt’s payloads are linked to crypto mining activities. Organizations should be…

  • CloudMe Sync CVE-2018-6892

    CloudMe Sync before version 1.11.0 is affected by CVE-2018-6892[1]. This vulnerability allows an unauthenticated remote attacker to exploit the “CloudMe Sync” client application, which listens on port 8888[1]. By sending a malicious payload, the attacker can trigger a buffer overflow vulnerability in the application[1]. Successful exploitation of this vulnerability allows the attacker to gain control…

  • Bypassing modern anti-exploit mechanisms

    Modern operating systems employ a variety of anti-exploit mechanisms known as exploit mitigation techniques to prevent and limit the success of malicious activities on a system. Yet, skilled attackers and malware creators continually develop methods to bypass these defenses. Here are several modern anti-exploit mechanisms and ways they might be circumvented: As a malware analyst,…

  • MOVEit Transfer Attack

    MOVEit Transfer Attack TTP for Malware Analyst Overview MOVEit Transfer is a secure file transfer solution organizations use to exchange sensitive data. While the product is designed to be secure, attackers may still target the users, infrastructure, or underlying systems to compromise the transferred data. The TTP (Tactics, Techniques, and Procedures) for a MOVEit Transfer…