Websec Blog

Find tutorials, guides, news updates and learn about security best practices.
detective search icon virus icon
cover image for article: Malware analysis report: MagicRAT (Lazarus)

Malware analysis report: MagicRAT (Lazarus)

MagicRat malware is a remote access trojan (RAT) that is primarily distributed through exploiting vulnerabilities such as Log4j in VMware Horizon. Malware is software that is designed to give its crea

cover image for article: PGP encryption. Practical examples

PGP encryption. Practical examples

A simple implementations of PGP encryption in Python

cover image for article: Static malware analysis: Office documents

Static malware analysis: Office documents

Hello and welcome back to a new practical case: analyze office documents. In our case, we are going to start looking at how to analyze Microsoft Office documents.

cover image for article: Classic Malware: Carbanak. Part 2

Classic Malware: Carbanak. Part 2

This little analysis is based on leaked banking malware Carbanak's source codes.

cover image for article: Malware Analysis example. Classic case: Stuxnet. Part 2

Malware Analysis example. Classic case: Stuxnet. Part 2

In this part 2 of our reverse engineering article of the stuxnet malware we will continue where we left off last time and take a deeper dive into the how and the what in regards to its functionality.

cover image for article: Reverse shells and cats (netCAT, soCAT)

Reverse shells and cats (netCAT, soCAT)

In this post, we will investigate the concept of a reverse shell and examine some examples of its application in practice by making use of netcat and socat.

Load More