This is a blog associated with SecurityXploded which presents state of art research articles & security tools pertaining to Cryptography, Reverse Engineering, Anti-Spyware, Password Recovery, System Security etc.
Owner: securityxploded
Listed in: Computers
Language: English
Tags: Cryptography, Reverse Engineering, Password Recovery, System Security, Anti-Spyware
Site Statistics
Unique Visitors Today:
0
Page Views Today:
0
Unique Visitors this Week:
0
Page Views this Week:
0
Unique Visitors this Month:
0
Page Views this Month:
0
Total Unique Visitors:
535
Total Page Views:
724
Total Hits Out:
85
Latest Blog Posts for SecurityXploded Blog
- Code Injection and API Hooking TechniquesHooking covers a range of techniques used for many purposes like debugging, monitoring, intercepting messages, extending functionality etc. Hooking is also used by a lot of rootkits to camouflage themselves on the system. Rootkits use various hooking...
- Announcement – SecurityXploded Security Meet and Mentorship Programmeon Mar 8, 2014 in Computer SecurityFrom the past two years we are working actively on couple of projects to support the security community. As you all may already know that we have successfully completed our reversing and malware analysis training programme and we are very glad that i...
- Advanced Malware Analysis Training Session 11 – (Part 2) Dissecting the HeartBeat RAT FunctionalitiesHere is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 2) Dissecting the HeartBeat RAT Functionalities This is part of our FREE ‘Advanced Malware Analysis Trai...
- Advanced Malware Analysis Training Session 10 – (Part 1) Reversing & Decrypting Communications of HeartBeat RAT Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 1) Reversing & Decrypting Communications of HeartBeat RAT This is part of our FREE ‘Advanced Malware An...
- Our Local Security Meet [19th October 2013] – Bangaloreon Oct 16, 2013 in Computer SecurityTalks: 09:30 – 10:00: WebSockets for Beginners – Prasanna K WebSockets is definitely one of the brighter features of HTML5. It allows for easy and efficient real-time communication with the server,. It’s very useful when you’...
- Detailed Overview and Internals of PE Fileon Oct 15, 2013 in Computer Security Reverse EngineeringA win32 portable executable(PE) file consists of: DOS Header, PE Header, Section Table, Sections. Analyzing a PE file gives us a lot of information like the address in memory where the file will be located (ImageBase), address of entry point, importe...
- Using PEB to Get Base Address of Kernelbase.dllon Sep 21, 2013 in Computer Security Secure CodingProcess Environment Block (PEB) is a user mode data structure which applies over a whole process. It is designed to be used by the application-mode code in the operating system libraries, such as NTDLL.dll, Kernel32.dll. Through the use of PEB one ca...
- SEH Exploitation to Get Shell Accesson Sep 16, 2013 in Antivirus Computer Security Reverse Engineering Security Vulnerability Vulnerability ResearchStructured Exception Handling is a mechanism for handling both hardware and software exceptions in Windows OS. Structured exception handling enables us to have complete control over the handling of exceptions and it also provides support for d...
- Our Local Security Meet [14th September 2013] – Bangaloreon Sep 12, 2013 in Computer SecurityTalks: 09:30 – 10:15: Webworkers for Beginners – Prasanna K Web workers are long-running scripts that are not interrupted by user-interface scripts (scripts that respond to clicks or other user interactions). Keeping such workers from b...
- Bamital Analysis using Malpimp and Pymalon Aug 27, 2013 in Computer Security Malware Analysis Security Tools Security Training Vulnerability ResearchA couple of months ago, I released my two new tools Malpimp and PyMal for malware analysis. Malpimp aims at API tracing and PyMal is a general purpose malware analysis tool. In this blog I will discuss how to use both of them in malware analysis. As...
Loading Comments...
Comments
{ds_PageTotalItemCount} commentcomments
{pvComments::date}
{pvComments::comment}