Exploit Development Exploiting buffer overflow in Windows application through TextBox using only Alphanumeric payload Lets look at how to exploit seh based buffer overflow in WIndows GUI application that have input restrictions of supporting only ascii characters as input. By Shubham Dubey 7 Sep 2018
Malware Malware analysis interview questions with detailed answers (Part 2) Here are few more important questions with detailed answers for malware analysis interview. Topic covers in this part is OS concepts, Programming, Assembly language and Dynamic analysis. By Shubham Dubey 6 Aug 2018
Malware Malware analysis interview questions with detailed answers (Part 1) Here is a series of important questions with detailed answers for malware analysis interviews. These question can be helpful for both candidates and interviewers. By Shubham Dubey 3 Aug 2018
Malware Deep dive into Tofsee spambot(Win32:Tofsee-J) malware dropper-2 In this part we will do the static analysis of dropper of tofsee .Tofsee is a spambot categorie of malware used to send spam messages, click fraud to different smtp mail server. By Shubham Dubey 5 Jul 2018
Malware Deep dive into Tofsee spambot(Win32:Tofsee-J) malware dropper-1 Tofsee is a spambot categorie of malware used to send spam messages, click fraud to different smtp mail server. In this part we will do the dynamic analysis of dropper of tofsee. By Shubham Dubey 3 Jul 2018
Rootkits Understanding Windows DKOM(Direct Kernel Object Manipulation) techniques(Part 1-EPROCESS) Windows uses different Objects structures for different purposes like io-management, process management etc. These structures are vulnerable to different attacks which we will going to discuss in this series. By Shubham Dubey 13 Jun 2018