Windows OS Peeling Back the Layers: Understanding Windows components Architecture through SAC/EMS Reversing In this article, we will be exploring the inner workings of how SAC operates! This will also give you a better understanding of the low-level components of Windows implementation details, and what you can look forward to after reversing them. By Shubham Dubey 6 Sep 2024
Windows OS Setting up EMS ( Emergency Management Services) SAC in Windows running inside Hyper-v In this article I will walk you though the process of setting up EMS (Emergency Management Services) for a system running in Hyper-V Virtual machine. We will also look into the features that EMS SAC provides. By Shubham Dubey 8 May 2024
Windows OS Remote Kernel Debugging Windows virtual machine (Generation 2) using Serial COM running inside Hyper-v This article is a step by step guide to attach windbg to remote windows kernel running inside generation 2 Hyper-V. By Shubham Dubey 27 Apr 2024
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 4 This article series is a technical dive into the evaluation of these memory corruption mitigations. This part is focus on memory error detection tools introduced over years. By Shubham Dubey 7 Jan 2024
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 3 This article series is a technical dive into the evaluation of these memory corruption mitigations. This part is focus on mitigations that second generation, mostly introduced after 2010. By Shubham Dubey 7 Jan 2024
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 2 This article series is a technical dive into the evaluation of these memory corruption mitigations. This part is focus of mitigations that first generation, introduced before 2010 mostly. By Shubham Dubey 7 Jan 2024
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 1 Arbitrary Code execution due to memory corruption is there since the years and still a major thing. Over the year, new protective measures have been introduced periodically to mitigate these attacks.This article series is a technical dive into the evaluation of these memory corruption mitigations. By Shubham Dubey 7 Jan 2024
Reverse engineering Remote debugging windows kernel driver(without symbols) using windbg In this post we are going to learn few tips and tricks to debug a Windows kernel driver without symbols in windbg. By Shubham Dubey 2 Jul 2021
Windows OS Fixing DLL exports for DLL hijacking(DLL proxy) In this post we will discuss ways to export functions from your dll for dll hijacking. Exporting functions | Dll Proxy By Shubham Dubey 5 Aug 2020
Windows OS Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links In this post we will discuss ways to mitigate symbolic links based Local privilege escalation exploits. We are also going to develop our own protection against these attacks. By Shubham Dubey 31 Jul 2020
Tutorial Developing and Installing your first Kernel driver in Windows 10(under 10 min) Windows kernel development is painful to follow after lots of changes in driver handling by windows. In this article I will help you with developing and installing your driver in less than 10 minutes in windows 10. By Shubham Dubey 10 Jun 2020
Exploit Development Breaking Antivirus: Arbitrary file deletion using Symbolic link A newly discovered symbolic link attack in many antivirus can cause arbitrary file deletion. In this blog, we will be discussing how to create the exploit and mitigate it. By Shubham Dubey 28 Apr 2020
Exploit Development Understanding and Exploiting Symbolic links in Windows - Symlink Attack EOP Symbolic link can be abused to cause elevation of privilege or arbitrary write/delete. In this article we are going to understand symlink and will learn how to exploit/abuse them. By Shubham Dubey 16 Apr 2020
Malware Malware analysis interview questions with detailed answers (Part 4) In this part we will discuss advance as well as miscellaneous questions for malware analysis interview. Even if you are already an experienced researcher, still these questions can be helpful for learning some new stuff. By Shubham Dubey 26 Dec 2019
Malware Malware analysis interview questions with detailed answers (Part 3) Here are few more important questions with detailed answers for malware analysis interview. Topic covers in this part is Dynamic analysis, static analysis and debugging. By Shubham Dubey 18 Sep 2018