Websec Blog

Find tutorials, guides, news updates and learn about security best practices.
detective search icon virus icon
cover image for article: Mobile pentesting series part 2: reversing Android application

Mobile pentesting series part 2: reversing Android application

You may be curious, as a penetration tester, as to how a particular app feature operates or what library it utilizes. Otherwise, you may be interested in the underlying architectures or components of

cover image for article: Mobile Pentesting Series - part 1: bypass SSL pinning in Android

Mobile Pentesting Series - part 1: bypass SSL pinning in Android

The purpose of this article is to demonstrate how to circumvent SSL pinning on Android.

cover image for article: STUN Protocol IP Exposure Tool by WebSec

STUN Protocol IP Exposure Tool by WebSec

The STUN Interception Tool is a powerful tool designed to leverage the principles of STUN. Learn more about its features and how to use it effectively.

cover image for article: YARA rules Part 2: Using modules

YARA rules Part 2: Using modules

Let's continue our acquaintance with YARA rules

cover image for article: YARA Part 1: Malware analysis for detecting IOC's

YARA Part 1: Malware analysis for detecting IOC's

Yara is an instrument used to assist malware researchers in the identification and classification of malware samples.

cover image for article: Malware analysis report: MagicRAT (Lazarus)

Malware analysis report: MagicRAT (Lazarus)

MagicRat malware is a remote access trojan (RAT) that is primarily distributed through exploiting vulnerabilities such as Log4j in VMware Horizon. Malware is software that is designed to give its crea

cover image for article: PGP encryption. Practical examples

PGP encryption. Practical examples

A simple implementations of PGP encryption in Python

cover image for article: Static malware analysis: Office documents

Static malware analysis: Office documents

Hello and welcome back to a new practical case: analyze office documents. In our case, we are going to start looking at how to analyze Microsoft Office documents.

cover image for article: Classic Malware: Carbanak. Part 2

Classic Malware: Carbanak. Part 2

This little analysis is based on leaked banking malware Carbanak's source codes.

cover image for article: Malware Analysis example. Classic case: Stuxnet. Part 2

Malware Analysis example. Classic case: Stuxnet. Part 2

In this part 2 of our reverse engineering article of the stuxnet malware we will continue where we left off last time and take a deeper dive into the how and the what in regards to its functionality.

cover image for article: Reverse shells and cats (netCAT, soCAT)

Reverse shells and cats (netCAT, soCAT)

In this post, we will investigate the concept of a reverse shell and examine some examples of its application in practice by making use of netcat and socat.

cover image for article: Classic Malware: Carbanak

Classic Malware: Carbanak

This little analysis is based on leaked banking malware Carbanak's source codes.

Load More