Search results

  1. M33

    Deep Dive into a Custom Malware Packer

    Deep Dive into a Custom Malware Packer c0d3inj3cT July 17, 2013 Introduction In this article we will look in depth at a Custom Packer used by a Malware that was recently found in the wild. This packer is interesting for several reasons. It uses several layers of packers including the...
  2. M33

    Memory Forensics and Analysis Using Volatility

    Memory Forensics and Analysis Using Volatility Aditya Balapure July 22, 2013 Volatility is one of the best open source software programs for analyzing RAM in 32 bit/64 bit systems. It supports analysis for Linux, Windows, Mac, and Android systems. It is based on Python and can be run on...
  3. M33

    Anatomy of BIOS Security

    Anatomy of BIOS Security Albert Fruz July 31, 2013 Introduction Computer security has become much harder to manage in recent years, and this is due to the fact that attackers continuously come up with new and more effective ways to attack our systems. As attackers become increasingly...
  4. M33

    Pharming Attack

    Pharming Attack Ahmed Mohamed August 01, 2013 Internet usage is growing dramatically, but the vast majority of Internet users don’t have security backgrounds. Nor do a large majority of companies care about information security and the possible severity of any attack that could harm valuable...
  5. M33

    Anti-debugging and Anti-VM techniques and anti-emulation

    Anti-debugging and Anti-VM techniques and anti-emulation August 01, 2013 D12d0x34X These days malware is becoming more advanced. Malware Analysts use lots of debugging software and applications to analyze malware and spyware. Malware authors use some techniques to detect the presence of...
Top Bottom