-
Recent Posts
Recent Comments
Archives
- May 2022
- April 2022
- December 2021
- November 2021
- July 2021
- May 2021
- March 2021
- August 2020
- July 2020
- March 2020
- February 2020
- January 2020
- October 2019
- September 2019
- July 2019
- May 2019
- April 2019
- March 2019
- January 2019
- November 2018
- October 2018
- August 2018
- July 2018
- May 2018
- April 2018
- December 2017
- November 2017
- October 2017
- August 2017
- April 2017
- February 2017
- November 2016
- September 2016
- August 2016
- July 2016
- June 2016
- April 2016
- March 2016
- February 2016
- January 2016
- November 2015
- April 2014
- December 2013
- September 2013
- July 2013
- June 2013
- April 2013
- December 2012
- August 2012
- July 2012
- June 2012
- May 2012
- March 2012
- February 2012
- December 2011
- November 2011
- October 2011
- August 2011
- December 2009
Categories
Meta
Tag Archives: Networking
A new version of the Rig EK
It looks like the developers of the Rig EK have been busy. In my last post Pulling apart Rig Exploit Kit we see the way the decompiled flash file looked. It used several action script files and used 2 different … Continue reading
De-obfuscating Cerber Malspam file
On July 1’st 2016 I seen a tweet by Herbie Zimmerman @HerbieZimmerman where he had gotten a zip file from some malaspam containing an obfuscated Java Script file. The infection chain is documented on his site here https://www.herbiez.com/?p=550 He had … Continue reading
Posted in Malware, Networking, security
Tagged Malware Analysis, Networking
Comments Off on De-obfuscating Cerber Malspam file
Unknown Exploit Kit
When I first seen a screenshot of this one that’s what this was, Unknown. Here is the twitter message that Jérôme Segura from Malwarebytes posted. and the response by William Metcalf @node5 replied that it was Sundown/Xer and they steal … Continue reading
Posted in Computer, Malware, Networking, security
Tagged Malware Analysis, Networking
Comments Off on Unknown Exploit Kit
Decoding Angler Exploit Kit
After my last post Some data on Angler Exploit Kit I had received a request to write up a tutorial on decoding the Angler EK. The Question is where to start ? Since they seem to be on vacation or … Continue reading
Posted in Malware, Programming, security
Tagged Decoding, Malware Analysis, Networking
Comments Off on Decoding Angler Exploit Kit
Some data on Angler Exploit Kit
Here is some data assembled from Multiple Pcap’s. First I would like to thank Brad @malware_traffic for all of the Pcap’s and write-ups posted on http://www.malware-traffic-analysis.net/. I have downloaded All (almost all I’m sure I missed a couple) Pcap files … Continue reading
2016-03-30 – TRAFFIC ANALYSIS EXERCISE – MARCH MADNESS
Here is another “Malware Traffic Exercise”. The Scenario: The last company we were working for at Cupids Arrow in one of the last exercise went bankrupt and do to needing a job we accepted the offer from the former owners … Continue reading
Posted in Malware, Networking, security
Tagged Malware Analysis, Networking
Comments Off on 2016-03-30 – TRAFFIC ANALYSIS EXERCISE – MARCH MADNESS
2016-03-24 – ANGLER AND NUCLEAR EK KICKED OFF BY SAME COMPROMISED SITE
In this Traffic we get the chance to look at 2 infections from the same site, but I will concentrate mainly on the exploit kits themselves and the similarities between them noticed while looking at the decoded source code. You … Continue reading
Posted in Malware, Networking, security
Tagged Malware Analysis, Networking, Security
Comments Off on 2016-03-24 – ANGLER AND NUCLEAR EK KICKED OFF BY SAME COMPROMISED SITE
2016-02-28 – TRAFFIC ANALYSIS EXERCISE – IDEAL VERSUS REALITY
Here is another Malware Traffic Exercise write-up. http://www.malware-traffic-analysis.net/2016/02/28/index.html Scenario: What’s my definition of a security analyst? Security analysts are responsible for monitoring their employer’s network and providing near-real-time detection of suspicious activity. Ideally, these analysts have access to intrusion detection … Continue reading
Posted in Networking, security
Tagged Malware Analysis, Networking
Comments Off on 2016-02-28 – TRAFFIC ANALYSIS EXERCISE – IDEAL VERSUS REALITY
2016-02-06 – TRAFFIC ANALYSIS EXERCISE – NETWORK ALERTS AT CUPID’S ARROW ONLINE
Scenario: You recently hired on as a security analyst for Cupid’s Arrow Online, the largest online retailer for novelty arrows world-wide. Unfortunately, it’s after normal work hours, and you’re the only person reviewing network events. You silently curse your coworker … Continue reading
Posted in Computer, Malware, Networking, security
Tagged Malware Analysis, Networking
Comments Off on 2016-02-06 – TRAFFIC ANALYSIS EXERCISE – NETWORK ALERTS AT CUPID’S ARROW ONLINE
2016-01-07 – TRAFFIC ANALYSIS EXERCISE – ALERTS ON 3 DIFFERENT HOSTS
SCENARIO: You are working as an analyst reviewing suspicious network events at your organization’s Security Operations Center (SOC). Things have been quiet for a while. However, you notice several alerts occur within minutes of each other on 3 separate hosts. … Continue reading