Addressing Malware Issues from an Operational Perspective
By: Michael Robinson For approximately four years, I was responsible for the operation of a Local Area Network (LAN). Over that time the user population and data stored on the LAN more than the...
View ArticleDecoding Data Exfiltration – Reversing XOR Encryption
By: Brian Hussey One of the first and most important questions that intrusion analysts are asked after a network attack is “did they steal anything?”. And if so, “what did they take?”. Often, this is...
View ArticleHarris @ DoD Cyber Crime Conference 2012
For all those readers attending the DoD Cyber Crime Conference, please don’t forget to visit us at booth #509. We love to talk nerd and you can meet some of this blog’s authors. We’re always looking to...
View ArticleFile Type Identification and Its Application for Reversing XOR Encryption
By: John Ortiz After reading Brian Hussey’s blog on “Decoding Data Exfiltration – Reversing XOR Encryption”, I wanted to share some basic statistical techniques for identifying the type of data that...
View ArticleCome see us at CEIC in Vegas!
Next week, from May 21-24, Paul Nichols and Brian Hussey will be presenting at the CEIC Forensic Conference in Summerlin, Nevada speaking on the topic of Dynamic Malware Analysis of a current banking...
View Article
More Pages to Explore .....