Skip to main content

Advanced Malware Analysis Training Sessi...

Advanced Malware Analysis Training Session 11 – (Part 2)  Dissecting the HeartBeat RAT Functionalities

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 2) Dissecting the HeartBeat  RAT Functionalities   This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session, I explained “Decrypting various Communications Of HeartBeat […]

Advanced Malware Analysis Training Sessi...

Advanced Malware Analysis Training Session 10 – (Part 1) Reversing & Decrypting Communications of HeartBeat RAT

  Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 1) Reversing & Decrypting Communications of HeartBeat RAT This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session, I explained “Decrypting The […]

Advanced Malware Analysis Training Sessi...

Advanced Malware Analysis Training Session 2 – Botnet Analysis

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) where Amit Malik delivered a superb session on analysis of Botnets with practical case study. This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012. In this session Amit Malik explained various advanced stealth techniques including command & […]

Stealing iPhone Backups using Metasploit

Stealing iPhone Backups using Metasploit

Introduction to iPhone Backups: iTunes is used to back up the iPhone data to a computer. iTunes backup makes a copy of everything on the device like contacts, SMS, photos, calendar, music, call logs, configuration files, database files, keychain, network settings, offline web application cache, safari bookmarks, cookies and application data, etc. It also backups […]

FireMaster Video Tutorial Showing Hybrid...

FireMaster is the first ever built tool to recover the lost master password of Firefox. Master password is used by Firefox to protect the stored sign-on information for all visited websites. If the master password is forgotten, then there is no way to recover the master password and user will lose all the sign-on information […]

Detecting ‘Slow Dll Hijacking’ Vulnerabi

Detecting ‘Slow Dll Hijacking’ Vulnerability using DllHijackAuditor

‘Dll Hijack’ vulnerability is one of the recently highlighted critical security issue affecting most of the popular Windows applications. Every day researchers are discovering more and more applications which are vulnerable to various forms of ‘Dll Hijacking’ and at the same time attackers have started exploiting these vulnerable applications. . In that event, we had […]

Unleashing VASTO – A Virtualization Asse

Unleashing VASTO – A Virtualization Assesment Toolkit

VASTO is the first of its kind toolkit designed to asses the security of various Virtualization solutions including VMWare and Xen server.  It is implemented as set of modules which can be integrated into Metasploit , the popular penetration testing framework.  This makes it very easy for pen testers to directly integrate VASTO with their […]