A simple implementations of PGP encryption in Python
Hello and welcome back to a new practical case: analyze office documents. In our case, we are going to start looking at how to analyze Microsoft Office documents.
This little analysis is based on leaked banking malware Carbanak's source codes.
In this part 2 of our reverse engineering article of the stuxnet malware we will continue where we left off last time and take a deeper dive into the how and the what in regards to its functionality.
In this post, we will investigate the concept of a reverse shell and examine some examples of its application in practice by making use of netcat and socat.