Mar 7Analyzing Malicious PDFs DocumentsThis article has been co-authored by. 1. Mr. Waqas Haider — Chief Information Security Officer — HBL MicroFinance Bank 2. Mr. Muhammad Ali – Manager GRC – Telenor MicroFinance Bank (EasyPaisa) Introduction PDF Files have been used by adversaries for years due to the functionalities it provides. Adversaries can add JavaScript…Malware Analysis13 min read
Feb 6SysInternals — The Other Way AroundWe all have been sometime, someday in our professional life have used SysInternals Suite. I personally have used these utilities extensively throughout my career as well. The utilities in the SysInternal Suite are categorized into the following. File and Disk Utilities Networking Utilities Process Utilities Security Utilities System Information Miscellaneous …Sysinternals3 min read
Jan 25Chopper — An Automated Security Headers AnalyzerIn recent times, while performing security assessments of web applications, it has always been a challenge to keep an eye on HTTP Security Headers. Just to ensure they are properly set on the server side and are added into the response all the time. It is also very hectic, if…Chopper2 min read
Nov 21, 2021Pwnable — FD — WalkthroughPwnable — FD — Challenge WarGames are really good at getting hand-on experience. In this article we are going to solve pwnable 1st challenge named “fd”. http://pwnable.kr/play.php Once we are logged into the target machine using the provided credentials. …Pwnablekr Writeup4 min read
Nov 15, 2021Reverse Engineering — My First CrackmeReverse Engineering is really fun but one of the most difficult field in Cyber Security. You not only need to know the programming languages but are also required to have a good understanding of Assembly Language. Most commonly Intel Architectures. This article is the first in the series of doing…C4 min read
Nov 13, 2021Hunting Patterns — YARA Rules — A Beginner Friendly JourneyIn this universe, where we were brought into place (earth) everything has a pattern. Even our daily lives follow a particular pattern. If we don’t follow it, we get depressed, stressed, sleep deprived and much more. …Yara5 min read
Jul 22, 2021The Crown Jewels & The Pyramid of PainThere will be times when you will keep hearing about The Crown Jewels and The Pyramid of Pain. These two are very important when it comes to Cyber Security. In today’s world all we are trying is to secure our critical assets (Mission Critical Assets). These are the assets which…Pyramid Of Pain6 min read
Apr 29, 2021System Information Discovery — Gathering System Information For Malware InfectionsWhen we take a look at MITRE Discovery Techniques we find that System Information Discovery is there. This is crucially important as it yields a huge amount of information of a particular system. In the past there have been huge kind of malware attacks in which it looked at the…Malware4 min read
Apr 25, 2021Windows Command Shell — Malware ExecutionIn my previous article I have talked about Windows Registry Keys i.e. what are they and how attackers/adversaries can alter their values in order to stay persistent and keep on doing what they want to do. In this, article I will be talking about Windows Command Shell and how adversaries…Cmd5 min read
Apr 25, 2021Registry Run Keys / Startup Folder — Malware PersistenceIn the world of today, Cyber Adversaries are on rise. They are targeting every kind of organization to gain access and then hide themselves for long time in order to hunt down every bit of information required. …Malware5 min read