Websec Blog

Find tutorials, guides, news updates and learn about security best practices.
detective search icon virus icon
cover image for article: STUN Protocol IP Exposure Tool by WebSec

STUN Protocol IP Exposure Tool by WebSec

The STUN Interception Tool is a powerful tool designed to leverage the principles of STUN. Learn more about its features and how to use it effectively.

cover image for article: YARA rules Part 2: Using modules

YARA rules Part 2: Using modules

Let's continue our acquaintance with YARA rules

cover image for article: YARA Part 1: Malware analysis for detecting IOC's

YARA Part 1: Malware analysis for detecting IOC's

Yara is an instrument used to assist malware researchers in the identification and classification of malware samples.

cover image for article: Malware analysis report: MagicRAT (Lazarus)

Malware analysis report: MagicRAT (Lazarus)

MagicRat malware is a remote access trojan (RAT) that is primarily distributed through exploiting vulnerabilities such as Log4j in VMware Horizon. Malware is software that is designed to give its crea

cover image for article: PGP encryption. Practical examples

PGP encryption. Practical examples

A simple implementations of PGP encryption in Python

cover image for article: Static malware analysis: Office documents

Static malware analysis: Office documents

Hello and welcome back to a new practical case: analyze office documents. In our case, we are going to start looking at how to analyze Microsoft Office documents.

cover image for article: Classic Malware: Carbanak. Part 2

Classic Malware: Carbanak. Part 2

This little analysis is based on leaked banking malware Carbanak's source codes.

cover image for article: Malware Analysis example. Classic case: Stuxnet. Part 2

Malware Analysis example. Classic case: Stuxnet. Part 2

In this part 2 of our reverse engineering article of the stuxnet malware we will continue where we left off last time and take a deeper dive into the how and the what in regards to its functionality.

cover image for article: Reverse shells and cats (netCAT, soCAT)

Reverse shells and cats (netCAT, soCAT)

In this post, we will investigate the concept of a reverse shell and examine some examples of its application in practice by making use of netcat and socat.

cover image for article: Classic Malware: Carbanak

Classic Malware: Carbanak

This little analysis is based on leaked banking malware Carbanak's source codes.

cover image for article: Malware Analysis example. Classic case: Stuxnet

Malware Analysis example. Classic case: Stuxnet

Stuxnet, as it came to be known, was unlike any other virus or worm that came before. In today's article we will reverse engineer this malware in order to better understand its code.

cover image for article: Static malware analysis of PDF files

Static malware analysis of PDF files

We will do static analysis on PDF documents, including analysis of embedded strings.

cover image for article: Intro to static malware analysis

Intro to static malware analysis

Static code analysis is the technique of studying the source code of a program without running it. This can be valuable for malware reverse engineering, as it can assist discover dangerous code.

cover image for article: What is DLL Hijacking? And How Does it Work?

What is DLL Hijacking? And How Does it Work?

DLL hijacking is a method in which a trusted and legit program is tricked into loading a malicious DLL.

cover image for article: How to Get Into Cybersecurity

How to Get Into Cybersecurity

Looking to learn how to break into cybersecurity? Search no further! This article covers everything you need to know about getting into cybersecurity.

cover image for article: Top 10 Best Security Tools for Pentesting

Top 10 Best Security Tools for Pentesting

This article covers the top 10 best security tools for pentesting. Learn the key features of each tool and where to hire the best pentesting experts.

cover image for article: 5 Major Types of Phishing Attacks

5 Major Types of Phishing Attacks

This article covers the five major types of phishing attacks. Read to learn how phishing attacks work and how to prevent various types of phishing.

cover image for article: What is Phishing? How it Works and How to Prevent Attacks

What is Phishing? How it Works and How to Prevent Attacks

This article covers everything you need to know about phishing. Read to learn what it is, how it works, its features, and how to prevent phishing attacks.

Load More