Quantcast
Channel: Crucial Security Forensics Blog » Malware Reverse Engineering
Browsing latest articles
Browse All 5 View Live

Image may be NSFW.
Clik here to view.

Addressing Malware Issues from an Operational Perspective

By: Michael Robinson For approximately four years, I was responsible for the operation of a Local Area Network (LAN). Over that time the user population and data stored on the LAN more than the...

View Article



Image may be NSFW.
Clik here to view.

Decoding Data Exfiltration – Reversing XOR Encryption

By: Brian Hussey One of the first and most important questions that intrusion analysts are asked after a network attack is “did they steal anything?”. And if so, “what did they take?”. Often, this is...

View Article

Image may be NSFW.
Clik here to view.

Harris @ DoD Cyber Crime Conference 2012

For all those readers attending the DoD Cyber Crime Conference, please don’t forget to visit us at booth #509. We love to talk nerd and you can meet some of this blog’s authors. We’re always looking to...

View Article

Image may be NSFW.
Clik here to view.

File Type Identification and Its Application for Reversing XOR Encryption

By: John Ortiz After reading Brian Hussey’s blog on “Decoding Data Exfiltration – Reversing XOR Encryption”, I wanted to share some basic statistical techniques for identifying the type of data that...

View Article

Image may be NSFW.
Clik here to view.

Come see us at CEIC in Vegas!

Next week, from May 21-24, Paul Nichols and Brian Hussey will be presenting at the CEIC Forensic Conference in Summerlin, Nevada speaking on the topic of Dynamic Malware Analysis of a current banking...

View Article

Browsing latest articles
Browse All 5 View Live




Latest Images