andreas_griffin Archive
+
Have you ever wondered how malware is detected? How do malware scanners work? How does Gmail know that the suspicious attachment you got was “dangerous”? The …
By Andreas Griffin
March 12, 2020
+
In recent times, I have learned about techniques in developing modern malware. One of those techniques was to utilize PowerShell without executing the powershell.exe binary. After …
By Andreas Griffin
March 5, 2020
+
1. What is Living off the Land? The use of Living off the Land (LotL) tactics and tools by cyber criminals has been a growing trend …
By Andreas Griffin
February 27, 2020
+
Hi everyone, today I will introduce you to BlackArch OS and installation instructions. BlackArch is a penetration testing distribution based on Arch Linux that provides a …
By Andreas Griffin
February 21, 2020
+
Fast-Flux is a DNS technique that involves frequent and rapid changing of the IP addresses associated with a Fully Qualified Domain Name (FQDN) by using a …
By Andreas Griffin
February 12, 2020
+
Usually, malicious code connects to the C&C server via a domain or IP address. DGA – Domain Generation Algorithm is a technique employed by the malware …
By Andreas Griffin
September 12, 2019
+
Today, I will show you how to customize firmware for some Yi camera families. This article references the yi-hack-v4 project on github. Link project: https://github.com/TheCrypt0/yi-hack-v4.git 1. …
By Andreas Griffin
July 21, 2019
+
Radare2 (also known as r2) is a complete framework for reverse-engineering and analyzing binaries; composed of a set of small utilities that can be used together …
By Andreas Griffin
April 1, 2019