#blue teaming

detective search icon virus icon
cover image for article: Mobile pentesting series part 2: reversing Android application

Mobile pentesting series part 2: reversing Android application

You may be curious, as a penetration tester, as to how a particular app feature operates or what library it utilizes. Otherwise, you may be interested in the underlying architectures or components of

cover image for article: YARA rules Part 2: Using modules

YARA rules Part 2: Using modules

Let's continue our acquaintance with YARA rules

cover image for article: YARA Part 1: Malware analysis for detecting IOC's

YARA Part 1: Malware analysis for detecting IOC's

Yara is an instrument used to assist malware researchers in the identification and classification of malware samples.

cover image for article: Malware analysis report: MagicRAT (Lazarus)

Malware analysis report: MagicRAT (Lazarus)

MagicRat malware is a remote access trojan (RAT) that is primarily distributed through exploiting vulnerabilities such as Log4j in VMware Horizon. Malware is software that is designed to give its crea

cover image for article: Static malware analysis: Office documents

Static malware analysis: Office documents

Hello and welcome back to a new practical case: analyze office documents. In our case, we are going to start looking at how to analyze Microsoft Office documents.

cover image for article: Classic Malware: Carbanak. Part 2

Classic Malware: Carbanak. Part 2

This little analysis is based on leaked banking malware Carbanak's source codes.

Load More