Websec Blog

Find tutorials, guides, news updates and learn about security best practices.
detective search icon virus icon
cover image for article: PGP encryption. Practical examples

PGP encryption. Practical examples

A simple implementations of PGP encryption in Python

cover image for article: Static malware analysis: Office documents

Static malware analysis: Office documents

Hello and welcome back to a new practical case: analyze office documents. In our case, we are going to start looking at how to analyze Microsoft Office documents.

cover image for article: Classic Malware: Carbanak. Part 2

Classic Malware: Carbanak. Part 2

This little analysis is based on leaked banking malware Carbanak's source codes.

cover image for article: Malware Analysis example. Classic case: Stuxnet. Part 2

Malware Analysis example. Classic case: Stuxnet. Part 2

In this part 2 of our reverse engineering article of the stuxnet malware we will continue where we left off last time and take a deeper dive into the how and the what in regards to its functionality.

cover image for article: Reverse shells and cats (netCAT, soCAT)

Reverse shells and cats (netCAT, soCAT)

In this post, we will investigate the concept of a reverse shell and examine some examples of its application in practice by making use of netcat and socat.

cover image for article: Classic Malware: Carbanak

Classic Malware: Carbanak

This little analysis is based on leaked banking malware Carbanak's source codes.

Load More