Category Archives: Uncategorized

Dead Drop Resolvers: Espionage-Inspired C&C Communications

A “dead drop” is a well-known espionage tactic of passing items or information between two parties using secret locations. The two parties never meet and any sign of communication is concealed. This tactic is commonly used by intelligence officers to interact with their assets in the field to avoid any suspicious meetings or either caught […]

Analyzing Threats Targeting Point-of-Sale (POS) Systems

Background A point of sale (POS) system refers to the critical piece of software used by customers to execute a payment for goods or a service. This also includes the physical devices in stores, where POS terminals and systems are used to process card payments. These are often the primary targets of financially motivated organised […]

Malicious JavaScript Analysis

JavaScript is a programming language commonly used in web browsers. Due to its use in web browsers, it is often employed by security researchers and malicious actors to identify and exploit security vulnerabilities in browsers (e.g., the Aurora Operation). Additionally, JavaScript is also used by exploit kits to gain control over target systems and deliver […]

Automation with IDAPython.

Although I find tools like Immunity Debugger/OllyDbg more useful as a debugger/disassembler for security research and malware analysis, this does not mean that I ignore the power and capabilities of the IDA debugger/disassembler, both for individual and corporate use. Particularly, IDA’s ability to decompile a program into its source code, its extensive platform support, the […]