02 APT Techniques: HTML SmugglingA few years ago, NOBELIUM APT, or APT29, were using a technique known as HTML Smuggling, which allowed them to deliver malicious software…Nov 14, 20221Nov 14, 20221
01 APT Techniques: Attacks Using Office MacrosIn recent years, a new technique has been discovered by threat researchers that are being used by various APTs such as FIN7, BlackEnergy…Nov 4, 2022Nov 4, 2022
02 Binary Exploitation: Format String VulnerabilityFormat String is a type of software vulnerability discovered around 1989 that could be used in security exploits. Originally thought to be…Nov 1, 2022Nov 1, 2022
01 Binary Exploitation: Buffer Overflow IntroductionBuffer Overflow is one of the oldest faults in the history of computing, and to this day, it’s been a problem, but not as often as before…Oct 30, 20222Oct 30, 20222
2 Ways to Dump Lsass Without MimikatzLocal Security Authority Subsystem Service, or better known as LSASS, is one of the core software of a Windows server. It is responsible…Oct 29, 2022Oct 29, 2022
Banking Trojan uses legitimate Avira executable to steal data from BrazilliansIn the year 2021, a wave of email phishing attacks were made, the trojan named as Javali is one of them. It was mainly distributed in Latin…Oct 9, 2022Oct 9, 2022
Analyzing Petya ransomwareHello hackers! In this article I will analyze the Petya ransomware that I found while browsing my social networks. Hope you like the…Sep 11, 2022Sep 11, 2022
Guia Anônima CTF: Infinitus — EasySalve salve hackers, beleza? Eu sou o MrEmpy e sejam bem-vindos a este writeup da máquina Infinitus do Guia Anônima CTF, onde eu ocupei a…Aug 11, 2022Aug 11, 2022
Assembly 16-bits: Printing StringsAssembly is undoubtedly a fantastic programming language where we can use it to control electronic components, and it is the language…Jul 10, 2022Jul 10, 2022
How do I destroy malware and identify the author — Malware AnalysisHello Hackers, I’m MrEmpy and welcome. Today I will tell a story of how I found the author of malware.Jun 27, 20221Jun 27, 20221